• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

网络防御的业务连续性策略:应对时间和信息过载

Business continuity strategies for cyber defence: battling time and information overload.

作者信息

Streufert John

机构信息

US Department of State, IRM/IA, Arlington, VA 22209, USA.

出版信息

J Bus Contin Emer Plan. 2010 Nov;4(4):303-16.

PMID:21177217
Abstract

Can the same numbers and letters which are the life blood of modern business and government computer systems be harnessed to protect computers from attack against known information security risks? For the past seven years, Foreign Service officers and technicians of the US Government have sought to maintain diplomatic operations in the face of rising cyber attacks and test the hypothesis that an ounce of prevention is worth a pound of cure. As eight out of ten attacks leverage known computer security vulnerabilities or configuration setting weaknesses, a pound of cure would seem to be easy to come by. Yet modern security tools present an unusually consequential threat to business continuity - too much rather than too little information on cyber problems is presented, harking back to a phenomenon cited by social scientists in the 1960s called 'information overload'. Experience indicates that the longer the most serious cyber problems go untreated, the wider the attack surface adversaries can find. One technique used at the Department of State, called 'risk scoring', resulted in an 89 per cent overall reduction in measured risk over 12 months for the Department of State's servers and personal computers. Later refinements of risk scoring enabled technicians to correct unique security threats with unprecedented speed. This paper explores how the use of metrics, special care in presenting information to technicians and executives alike, as well as tactical use of organisational incentives can result in stronger cyber defences protecting modern organisations.

摘要

现代商业和政府计算机系统的命脉——相同的数字和字母,能否被用来保护计算机免受已知信息安全风险的攻击?在过去七年里,面对日益增加的网络攻击,美国政府的外交官员和技术人员一直努力维持外交行动,并检验“一分预防胜过十分治疗”这一假设。由于十分之八的攻击利用已知的计算机安全漏洞或配置设置弱点,治疗似乎很容易实现。然而,现代安全工具对业务连续性构成了异常严重的威胁——呈现的网络问题信息过多而非过少,这让人回想起20世纪60年代社会科学家提到的一种现象,即“信息过载”。经验表明,最严重的网络问题得不到处理的时间越长,对手能够找到的攻击面就越广。美国国务院采用的一种名为“风险评分”的技术,使国务院服务器和个人计算机在12个月内的实测风险总体降低了89%。后来对风险评分的改进使技术人员能够以前所未有的速度纠正独特的安全威胁。本文探讨了如何通过使用指标、在向技术人员和管理人员提供信息时格外谨慎,以及策略性地运用组织激励措施,来打造更强大的网络防御,以保护现代组织。

相似文献

1
Business continuity strategies for cyber defence: battling time and information overload.网络防御的业务连续性策略:应对时间和信息过载
J Bus Contin Emer Plan. 2010 Nov;4(4):303-16.
2
Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.网络安全:对面临网络攻击风险的组织在信息共享与数据敏感性问题方面的批判性审视。
J Bus Contin Emer Plan. 2013;7(2):103-11.
3
The cyber threat, trophy information and the fortress mentality.网络威胁、战利品信息与堡垒心态。
J Bus Contin Emer Plan. 2011 Oct;5(3):195-207.
4
Breaking down silos between business continuity and cyber security.打破业务连续性与网络安全之间的壁垒。
J Bus Contin Emer Plan. 2019 Jan 1;12(3):224-232.
5
Enhancing infrastructure resilience through business continuity planning.通过业务连续性规划提高基础设施恢复力。
J Bus Contin Emer Plan. 2017 Jan 1;11(2):163-73.
6
Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.网络韧性:对英国和美国所应用的关键国家基础设施及网络安全保护措施的综述
J Bus Contin Emer Plan. 2013;7(2):149-62.
7
Cyber crime: can a standard risk analysis help in the challenges facing business continuity managers?网络犯罪:标准风险分析能否帮助应对业务连续性管理人员面临的挑战?
J Bus Contin Emer Plan. 2013;7(2):126-37.
8
Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.人为因素对医疗机构网络安全的影响:系统综述。
Sensors (Basel). 2021 Jul 28;21(15):5119. doi: 10.3390/s21155119.
9
Introducing cyber.介绍网络。
J Bus Contin Emer Plan. 2013;7(2):97-102.
10
The cyber security threat stops in the boardroom.网络安全威胁止步于董事会会议室。
J Bus Contin Emer Plan. 2013;7(2):138-48.