• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

运用敏捷性应对网络攻击。

Using agility to combat cyber attacks.

作者信息

Anderson Kerry

出版信息

J Bus Contin Emer Plan. 2017 Jun 1;10(4):298-307.

PMID:28610642
Abstract

Some incident response practitioners feel that they have been locked in a battle with cyber criminals since the popular adoption of the internet. Initially, organisations made great inroads in preventing and containing cyber attacks. In the last few years, however, cyber criminals have become adept at eluding defence security technologies and rapidly modifying their exploit strategies for financial or political gains. Similar to changes in military combat tactics, cyber criminals utilise distributed attack cells, real-time communications, and rapidly mutating exploits to minimise the potential for detection. Cyber criminals have changed their attack paradigm. This paper describes a new incident response paradigm aimed at combating the new model of cyber attacks with an emphasis on agility to increase the organisation's ability to respond rapidly to these new challenges.

摘要

一些事件响应从业者认为,自互联网广泛普及以来,他们就陷入了与网络犯罪分子的斗争之中。最初,各组织在预防和遏制网络攻击方面取得了很大进展。然而,在过去几年里,网络犯罪分子已变得善于规避防御安全技术,并迅速改变其利用策略以获取经济或政治利益。类似于军事作战战术的变化,网络犯罪分子利用分布式攻击单元、实时通信以及迅速变异的攻击手段,以尽量减少被发现的可能性。网络犯罪分子已经改变了他们的攻击模式。本文描述了一种新的事件响应模式,旨在应对新型网络攻击,重点在于灵活性,以提高组织对这些新挑战做出快速响应的能力。

相似文献

1
Using agility to combat cyber attacks.运用敏捷性应对网络攻击。
J Bus Contin Emer Plan. 2017 Jun 1;10(4):298-307.
2
How is cyber threat evolving and what do organisations need to consider?网络威胁是如何演变的,组织需要考虑哪些因素?
J Bus Contin Emer Plan. 2013;7(2):163-71.
3
Preventing a cyber attack takes commitment—and money.防范网络攻击需要投入精力和资金。
OR Manager. 2016 Oct;32(10):17, 19.
4
Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.网络韧性:对英国和美国所应用的关键国家基础设施及网络安全保护措施的综述
J Bus Contin Emer Plan. 2013;7(2):149-62.
5
Cyber crime: can a standard risk analysis help in the challenges facing business continuity managers?网络犯罪:标准风险分析能否帮助应对业务连续性管理人员面临的挑战?
J Bus Contin Emer Plan. 2013;7(2):126-37.
6
Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.网络安全:对面临网络攻击风险的组织在信息共享与数据敏感性问题方面的批判性审视。
J Bus Contin Emer Plan. 2013;7(2):103-11.
7
Breaking down silos between business continuity and cyber security.打破业务连续性与网络安全之间的壁垒。
J Bus Contin Emer Plan. 2019 Jan 1;12(3):224-232.
8
The cyber security threat stops in the boardroom.网络安全威胁止步于董事会会议室。
J Bus Contin Emer Plan. 2013;7(2):138-48.
9
How hospitals can protect themselves from cyber attack.医院如何保护自己免受网络攻击。
CMAJ. 2020 Jan 27;192(4):E101-E102. doi: 10.1503/cmaj.1095841.
10
What good cyber resilience looks like.良好的网络弹性是什么样的。
J Bus Contin Emer Plan. 2013;7(2):112-25.

引用本文的文献

1
EARS to cyber incidents in health care.医疗保健领域的网络事件。
J Am Med Inform Assoc. 2019 Jan 1;26(1):81-90. doi: 10.1093/jamia/ocy148.