• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

网络安全威胁止步于董事会会议室。

The cyber security threat stops in the boardroom.

作者信息

Scully Tim

出版信息

J Bus Contin Emer Plan. 2013;7(2):138-48.

PMID:24457325
Abstract

The attitude that 'it won't happen to me' still prevails in the boardrooms of industry when senior executives consider the threat of targeted cyber intrusions. Not much has changed in the commercial world of cyber security over the past few years; hackers are not being challenged to find new ways to steal companies' intellectual property and confidential information. The consequences of even major security breaches seem not to be felt by the leaders of victim companies. Why is this so? Surely IT security practitioners are seeking new ways to detect and prevent targeted intrusions into companies' networks? Are the consequences of targeted intrusions so insignificant that the captains of industry tolerate them? Or do only others feel the pain of their failure? This paper initially explores the failure of cyber security in industry and contends that, while industry leaders should not be alone in accepting responsibility for this failure, they must take the initiative to make life harder for cyber threat actors. They cannot wait for government leadership on policy, strategy or coordination. The paper then suggests some measures that a CEO can adopt to build a new corporate approach to cyber security.

摘要

当企业高管们考虑针对性网络入侵的威胁时,“这不会发生在我身上”的态度在行业董事会中仍然盛行。在过去几年里,网络安全的商业领域变化不大;黑客们并未面临寻找窃取公司知识产权和机密信息新方法的挑战。即使是重大安全漏洞的后果,受害公司的领导们似乎也没有感受到。为什么会这样呢?当然,信息技术安全从业者正在寻找新方法来检测和防止对公司网络的针对性入侵吧?针对性入侵的后果是否微不足道,以至于行业领袖们对此予以容忍?还是只有其他人感受到了他们失败带来的痛苦?本文首先探讨了行业网络安全的失败,并认为,虽然行业领袖不应独自承担这一失败的责任,但他们必须主动让网络威胁行为者的日子更不好过。他们不能坐等政府在政策、战略或协调方面发挥领导作用。然后本文提出了一些首席执行官可以采取的措施,以建立一种新的企业网络安全方法。

相似文献

1
The cyber security threat stops in the boardroom.网络安全威胁止步于董事会会议室。
J Bus Contin Emer Plan. 2013;7(2):138-48.
2
The cyber threat, trophy information and the fortress mentality.网络威胁、战利品信息与堡垒心态。
J Bus Contin Emer Plan. 2011 Oct;5(3):195-207.
3
How is cyber threat evolving and what do organisations need to consider?网络威胁是如何演变的,组织需要考虑哪些因素?
J Bus Contin Emer Plan. 2013;7(2):163-71.
4
Building organisational cyber resilience: A strategic knowledge-based view of cyber security management.构建组织的网络弹性:基于战略知识的网络安全管理视角
J Bus Contin Emer Plan. 2015;9(2):185-95.
5
Cyber crime: can a standard risk analysis help in the challenges facing business continuity managers?网络犯罪:标准风险分析能否帮助应对业务连续性管理人员面临的挑战?
J Bus Contin Emer Plan. 2013;7(2):126-37.
6
Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.网络安全:对面临网络攻击风险的组织在信息共享与数据敏感性问题方面的批判性审视。
J Bus Contin Emer Plan. 2013;7(2):103-11.
7
What good cyber resilience looks like.良好的网络弹性是什么样的。
J Bus Contin Emer Plan. 2013;7(2):112-25.
8
Using agility to combat cyber attacks.运用敏捷性应对网络攻击。
J Bus Contin Emer Plan. 2017 Jun 1;10(4):298-307.
9
Growing talent as if your business depended on it.培养人才,就好像你的事业依赖于此一样。
Harv Bus Rev. 2005 Oct;83(10):62-70, 155.
10
The geography of trust.信任的地域分布。
Harv Bus Rev. 2004 Mar;82(3):82-8, 127.