Suppr超能文献

整合网络弹性:全面业务弹性的关键组成部分。

Integrating cyber resilience: A critical component of comprehensive business resilience.

作者信息

Fernandes Robert

机构信息

The Investment Center.

出版信息

J Bus Contin Emer Plan. 2025 Jan 1;18(4):357-371. doi: 10.69554/LMGO9459.

Abstract

This paper advocates for the integration of threat exposure monitoring (TEM) as a critical tool in cyber security resilience frameworks. As organisations face increasing cyber threats, TEM provides an essential, proactive approach to identifying potential vulnerabilities before they can be exploited. By monitoring various online environments, including the dark web, hacker forums and misconfigured cloud storage, TEM can uncover compromised credentials, exposed data and other risk factors that could lead to operational disruptions. This proactive monitoring strategy enhances an organisation's preparedness, helping to prevent costly incidents and mitigate risks before they escalate. Using notable case studies, such as the Colonial Pipeline ransomware incident and the Orange Spain outage, the paper illustrates the devastating impact of cyber breaches and underscores how TEM could help avoid similar disruptions. Readers will gain an understanding of how to implement a TEM programme, identify critical digital assets for monitoring and integrate TEM within broader threat intelligence practices. Ultimately, this paper provides resilience professionals with a structured approach to leveraging TEM for robust cyber defence, offering practical insights on reducing exposure risks and strengthening overall business resiliency. This article is also included in The Business & Management Collection which can be accessed at https://hstalks.com/business/.

摘要

本文主张将威胁暴露监测(TEM)作为网络安全弹性框架中的一项关键工具加以整合。随着组织面临日益增加的网络威胁,TEM提供了一种至关重要的主动方法,以便在潜在漏洞被利用之前识别它们。通过监测各种在线环境,包括暗网、黑客论坛和配置错误的云存储,TEM能够发现被泄露的凭证、暴露的数据以及其他可能导致运营中断的风险因素。这种主动监测策略增强了组织的准备能力,有助于在事件升级之前预防代价高昂的事故并降低风险。通过使用一些著名的案例研究,如殖民管道公司勒索软件事件和西班牙电信Orange公司的网络中断事件,本文阐述了网络安全漏洞的毁灭性影响,并强调了TEM如何有助于避免类似的中断情况。读者将了解如何实施TEM计划、识别关键的数字资产以便进行监测以及将TEM整合到更广泛的威胁情报实践中。最终,本文为弹性专业人员提供了一种结构化方法,以利用TEM实现强大的网络防御,提供了关于降低暴露风险和加强整体业务弹性的实用见解。本文也收录于《商业与管理文集》,可通过https://hstalks.com/business/访问。

相似文献

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验