{"title":"小规模网络安全","authors":"E. Osborn, A. Simpson","doi":"10.1109/CSCloud.2015.12","DOIUrl":null,"url":null,"abstract":"The nature of cyberspace continues to evolve, and so do the associated threats. The focus of the cyber security industry is typically (and understandably) on high-value assets. However, there is a large user group intersecting with corporate and government IT users, which lacks the resources -- in terms of finance, time and/or knowledge -- to deal with the threats that they face. We argue that greater attention needs to be given to this user group, differentiating these small-scale IT users when thinking about cyber security. Going further, we argue that it is essential that the research community starts to give consideration to what we term Small-Scale Cyber Security. To this end, we describe the results of an initial feasibility study, as well as a research agenda for tackling this cross-disciplinary problem.","PeriodicalId":278090,"journal":{"name":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Small-Scale Cyber Security\",\"authors\":\"E. Osborn, A. Simpson\",\"doi\":\"10.1109/CSCloud.2015.12\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The nature of cyberspace continues to evolve, and so do the associated threats. The focus of the cyber security industry is typically (and understandably) on high-value assets. However, there is a large user group intersecting with corporate and government IT users, which lacks the resources -- in terms of finance, time and/or knowledge -- to deal with the threats that they face. We argue that greater attention needs to be given to this user group, differentiating these small-scale IT users when thinking about cyber security. Going further, we argue that it is essential that the research community starts to give consideration to what we term Small-Scale Cyber Security. To this end, we describe the results of an initial feasibility study, as well as a research agenda for tackling this cross-disciplinary problem.\",\"PeriodicalId\":278090,\"journal\":{\"name\":\"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSCloud.2015.12\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSCloud.2015.12","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The nature of cyberspace continues to evolve, and so do the associated threats. The focus of the cyber security industry is typically (and understandably) on high-value assets. However, there is a large user group intersecting with corporate and government IT users, which lacks the resources -- in terms of finance, time and/or knowledge -- to deal with the threats that they face. We argue that greater attention needs to be given to this user group, differentiating these small-scale IT users when thinking about cyber security. Going further, we argue that it is essential that the research community starts to give consideration to what we term Small-Scale Cyber Security. To this end, we describe the results of an initial feasibility study, as well as a research agenda for tackling this cross-disciplinary problem.