期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
突发事件对护理人员心理状况的影响 被引量:3
1
作者 马毓芬 张晓英 +2 位作者 王亚君 桂学萍 陈晓梅 《中国健康心理学杂志》 2010年第5期553-555,共3页
目的了解突发事件对护理人员心理健康状况的影响。方法突发事件后对乌鲁木齐市某综合医院护理人员以方便方式进行采样,调查工具采用焦虑自评量表(SAS)、抑郁自评量表(SDS)和症状自评量表(SCL-90)。结果护理人员的焦虑抑郁除民族(F=0.504... 目的了解突发事件对护理人员心理健康状况的影响。方法突发事件后对乌鲁木齐市某综合医院护理人员以方便方式进行采样,调查工具采用焦虑自评量表(SAS)、抑郁自评量表(SDS)和症状自评量表(SCL-90)。结果护理人员的焦虑抑郁除民族(F=0.504、0.407;P>0.05)和科室(F=0.176、0.741;P>0.05)外,其他结果比较均有显著的统计学差异(年龄F=5.361、3.753,学历F=5.379、3.096,职称F=9.269、7.012,护龄F=13.239、9.683,婚姻F=7.086、4.9;P<0.01或P<0.05);与乌鲁木齐市属医院990名护理人员比较有显著的统计学差异(t=2.8、2.6;P<0.01);与国内常模比较焦虑有显著的统计学差异(t=6.0,P<0.01)。症状自评量表与常模比较除人际关系(t=0.21,P>0.05)外,其余项目均有显著的统计学差异(总均分t=-3.16,其他项目t=3.58~22.15;P<0.01);与乌鲁木齐市属医院990名护理人员比较除躯体化(t=0.79,P>0.05)、强迫(t=1.36,P>0.05)、抑郁(t=1.93,P>0.05)和人际关系(t=1.77,P>0.05)外,其他项目均有显著的统计学差异(t=2.64~17.41;P<0.01)。结论突发事件可导致护理人员出现程度不同的心理痛苦,其心理健康水平与目击创伤事件的暴露程度和伤者数量有关。 展开更多
关键词 突发事件 护理人员 心理状况 问卷调查
下载PDF
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises
2
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期106-133,共28页
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo... As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm. 展开更多
关键词 Advanced Persistent Threats (APT) attack Phases attack Surface DEFENSE-IN-DEPTH Disaster Recovery (DR) incident Response Plan (IRP) Intrusion Detection Systems (IDS) Intrusion Prevention System (IPS) Key Risk Indicator (KRI) Layered Defense Lockheed Martin Kill Chain Proactive Defense Redundancy Risk Management Threat Intelligence
下载PDF
ECDSA签名方案的颠覆攻击与改进 被引量:2
3
作者 严都力 禹勇 +3 位作者 李艳楠 李慧琳 赵艳琦 田爱奎 《软件学报》 EI CSCD 北大核心 2023年第6期2892-2905,共14页
斯诺登事件揭露了某些密码体制的确存在被颠覆的事实.椭圆曲线数字签名算法(elliptic curve digital signature algorithm,ECDSA)在同等安全强度下,因其签名长度短而被广泛应用,如被用于比特币交易单的签名.ECDSA签名算法是否会被颠覆... 斯诺登事件揭露了某些密码体制的确存在被颠覆的事实.椭圆曲线数字签名算法(elliptic curve digital signature algorithm,ECDSA)在同等安全强度下,因其签名长度短而被广泛应用,如被用于比特币交易单的签名.ECDSA签名算法是否会被颠覆且存在修复方法仍是一个挑战.正面回答了这一问题:首先利用伪随机函数(pseudorandom function,PRF)计算k替换ECDSA签名中使用的随机数k,实现了对ECDSA签名的颠覆,使得敌手只需获得至多3个连续签名就能够提取出签名私钥;然后,将签名私钥、签名消息与其他随机签名组件的哈希值作为签名算法的第2个随机数,对ECDSA签名进行了改进,提出了抗颠覆攻击的ECDSA签名,即使敌手替换新签名算法的某个组件,也无法提取签名私钥的任何信息;最后,对提出的算法与已有算法进行了效率测试,实验结果证明了提出的算法在计算复杂度与算法执行效率方面都具备优势. 展开更多
关键词 斯诺登事件 ECDSA签名 比特币 颠覆攻击 哈希函数
下载PDF
Organizational Data Breach:Building Conscious Care Behavior in Incident Response
4
作者 Adlyn Adam Teoh Norjihan Binti Abdul Ghani +3 位作者 Muneer Ahmad Nz Jhanjhi Mohammed A.Alzain Mehedi Masud 《Computer Systems Science & Engineering》 SCIE EI 2022年第2期505-515,共11页
Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident responses.This research study draws upon the literature in the areas o... Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident responses.This research study draws upon the literature in the areas of information security,incident response,theory of planned behaviour,and protection motivation theory to expand and empirically validate a modified framework of information security conscious care behaviour formation.The applicability of the theoretical framework is shown through a case study labelled as a cyber-attack of unprecedented scale and sophistication in Singapore’s history to-date,the 2018 SingHealth data breach.The single in-depth case study observed information security awareness,policy,experience,attitude,subjective norms,perceived behavioral control,threat appraisal and self-efficacy as emerging prominently in the framework’s applicability in incident handling.The data analysis did not support threat severity relationship with conscious care behaviour.The findings from the above-mentioned observations are presented as possible key drivers in the shaping information security conscious care behaviour in real-world cyber incident management. 展开更多
关键词 End user computing organizational behavior incident response data breach computer emergency response team cyber-attack
下载PDF
对应急响应的思考 被引量:1
5
作者 武悦 《网络安全技术与应用》 2006年第9期53-54,20,共3页
本文先介绍应急响应的一般流程,然后着重介绍一种突发事件的定义方法,并由此寻求事件发生后的解决思路和指导思想,探讨一些解决方法。
关键词 应急响应 策略 攻击 漏洞
原文传递
关于第五次反“围剿”中一个问题的论证
6
作者 陈晓蓉 《华东交通大学学报》 2004年第3期101-104,共4页
苏区第五次反"围剿"由于"左"倾机会主义的错误主张,红军伤亡重大,根据地日益缩小,此时又发生"福建事变".根据敌我态势及国内形势的变化,有同志提出,应利用此机会,红军主力进到以浙江为中心的苏浙皖赣地区... 苏区第五次反"围剿"由于"左"倾机会主义的错误主张,红军伤亡重大,根据地日益缩小,此时又发生"福建事变".根据敌我态势及国内形势的变化,有同志提出,应利用此机会,红军主力进到以浙江为中心的苏浙皖赣地区去,迫使敌人回援江浙,并援助"福建事变",推动抗日救亡运动,粉碎敌人第五次"围剿".可是"左"倾机会主义者拒绝这个正确意见.战争打了一年之久的时候,有同志再次提出:红军主力应向湖南中部前进,调动江西敌人至湖南消灭之.对于上述向苏浙皖赣出击和向湖南中部前进这一建议究竟是谁提出的?党史界说法不完全一致.本文以史实为依据,作了实事求是的论证. 展开更多
关键词 第五次反“围剿” “左”倾机会主义 中国 红军 论证 抗日救亡运动
下载PDF
一种基于图模型的网络攻击溯源方法 被引量:15
7
作者 黄克振 连一峰 +3 位作者 冯登国 张海霞 吴迪 马向亮 《软件学报》 EI CSCD 北大核心 2022年第2期683-698,共16页
随着信息技术的飞速发展,网络攻击事件频发,造成了日益严重的经济损失或社会影响.为了减少损失或预防未来潜在的攻击,需要对网络攻击事件进行溯源以实现对攻击者的挖掘追责.当前的溯源过程主要依赖于人工完成,效率低下.面对日益增加的... 随着信息技术的飞速发展,网络攻击事件频发,造成了日益严重的经济损失或社会影响.为了减少损失或预防未来潜在的攻击,需要对网络攻击事件进行溯源以实现对攻击者的挖掘追责.当前的溯源过程主要依赖于人工完成,效率低下.面对日益增加的海量溯源数据和日趋全面的溯源建模分析维度,亟需半自动化或自动化的网络攻击者挖掘方法.提出一种基于图模型的网络攻击溯源方法,建立网络攻击事件溯源本体模型,融合网络攻击事件中提取的线索数据和威胁情报数据,形成网络攻击事件溯源关系图;引入图嵌入算法自动学习嵌有关联线索特征的网络攻击事件特征向量,进而利用历史网络攻击事件特征向量训练SVM(support vector machine)分类器,并基于SVM分类器完成网络攻击者的挖掘溯源;最后,通过实验验证了该方法的可行性和有效性. 展开更多
关键词 网络攻击事件 网络攻击者 溯源 网络攻击事件溯源 关系图 图嵌入
下载PDF
ERAD: Enhanced Ransomware Attack Defense System for Healthcare Organizations
8
作者 Xinyue Li Vijay K. Madisetti 《Journal of Software Engineering and Applications》 2024年第5期270-296,共27页
Digital integration within healthcare systems exacerbates their vulnerability to sophisticated ransomware threats, leading to severe operational disruptions and data breaches. Current defenses are typically categorize... Digital integration within healthcare systems exacerbates their vulnerability to sophisticated ransomware threats, leading to severe operational disruptions and data breaches. Current defenses are typically categorized into active and passive measures that struggle to achieve comprehensive threat mitigation and often lack real-time response effectiveness. This paper presents an innovative ransomware defense system, ERAD, designed for healthcare environments that apply the MITRE ATT&CK Matrix to coordinate dynamic, stage-specific countermeasures throughout the ransomware attack lifecycle. By systematically identifying and addressing threats based on indicators of compromise (IOCs), the proposed system proactively disrupts the attack chain before serious damage occurs. Validation is provided through a detailed analysis of a system deployment against LockBit 3.0 ransomware, illustrating significant enhancements in mitigating the impact of the attack, reducing the cost of recovery, and strengthening the cybersecurity framework of healthcare organizations, but also applicable to other non-health sectors of the business world. 展开更多
关键词 Ransomware Healthcare Cybersecurity MITRE ATT&CK Matrix incident Response Ransomware attack Lifecycle Digital Health Safety
下载PDF
诺门坎事件爆发原因及对日苏关系的影响 被引量:3
9
作者 李凡 《历史教学》 北大核心 2003年第10期40-44,共5页
诺门坎事件是日苏两国之间爆发的一场大规模武装冲突.日本挑起诺门坎事件的主要目的,就是要在侵华战争中,对苏联采取以攻为守迫使其放弃对华援助政策,另外借反苏名义换取西方国家继续推行绥靖主义政策.日本在诺门坎事件中遭到惨败,对以... 诺门坎事件是日苏两国之间爆发的一场大规模武装冲突.日本挑起诺门坎事件的主要目的,就是要在侵华战争中,对苏联采取以攻为守迫使其放弃对华援助政策,另外借反苏名义换取西方国家继续推行绥靖主义政策.日本在诺门坎事件中遭到惨败,对以后日苏关系产生重大影响,日本不得不放弃对苏强硬政策,同时在苏德战争中未敢轻易参加对苏作战. 展开更多
关键词 诺门坎事件 日本 苏联 武装冲突 绥靖主义政策 日苏关系
下载PDF
民初暂行报律事件透视 被引量:3
10
作者 闵伟峰 《绵阳师范学院学报》 2007年第6期143-145,共3页
1912年3月,南京临时政府内务部公布民国《暂行报律》,上海中国报界俱进会表示反对,孙中山随即令内务部取消《暂行报律》。民初《暂行报律》事件不只是一场新闻界争取新闻自由的斗争,更是几派政治势力对孙中山领导的南京临时政府的一次... 1912年3月,南京临时政府内务部公布民国《暂行报律》,上海中国报界俱进会表示反对,孙中山随即令内务部取消《暂行报律》。民初《暂行报律》事件不只是一场新闻界争取新闻自由的斗争,更是几派政治势力对孙中山领导的南京临时政府的一次攻击。 展开更多
关键词 《暂行报律》事件 攻击 孙中山 南京临时政府
下载PDF
Forensic Investigation in Communication Networks Using Incomplete Digital Evidences
11
作者 Slim REKHIS Jihene KRICHENE Noureddine BOUDRIGA 《International Journal of Communications, Network and System Sciences》 2009年第9期857-873,共17页
Security incidents targeting information systems have become more complex and sophisticated, and intruders might evade responsibility due to the lack of evidence to convict them. In this paper, we develop a system for... Security incidents targeting information systems have become more complex and sophisticated, and intruders might evade responsibility due to the lack of evidence to convict them. In this paper, we develop a system for Digital Forensic in Networking, called DigForNet, which is useful to analyze security incidents and explain the steps taken by the attackers. DigForNet combines intrusion response team knowledge with formal tools to identify the attack scenarios that have occurred and show how the system behaves for every step in the scenario. The attack scenarios construction is automated and the hypothetical concept is introduced within DigForNet to alleviate missing data related to evidences or investigator knowledge. DigForNet system supports the investigation of attack scenarios that integrate anti-investigation attacks. To exemplify the proposal, a case study is proposed. 展开更多
关键词 FORMAL Digital INVESTIGATION incident Response Probabilistic Cognitive Map DigForNet Anti- Forensic attackS INVESTIGATION attack Scenarios Reconstruction
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部