期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
等级保护测评过程中常见的静态密码风险及防护建议 被引量:1
1
作者 胡亚兰 张艳 《网络空间安全》 2018年第4期59-61,共3页
虽然身份鉴别技术随着信息科技的发展也在不断更新,但静态密码目前仍然是信息系统中常用的身份鉴别方式,尤其是信息系统建设方式的发展,也给信息系统中涉及的操作系统、网络设备、安全设备、应用软件等层面的静态口令带来新的风险。文... 虽然身份鉴别技术随着信息科技的发展也在不断更新,但静态密码目前仍然是信息系统中常用的身份鉴别方式,尤其是信息系统建设方式的发展,也给信息系统中涉及的操作系统、网络设备、安全设备、应用软件等层面的静态口令带来新的风险。文章梳理了等级保护测评过程中常见的静态密码风险,并针对各个风险提出了防护措施。 展开更多
关键词 静态密码 信息系统 等级保护测评 信息安全
下载PDF
Cyberattack Ramifications, The Hidden Cost of a Security Breach
2
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期87-105,共19页
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ... In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain. 展开更多
关键词 Artificial Intelligence (AI) Business Continuity Case Studies Copyright Cost-Benefit Analysis Credit rating Cyberwarfare Cybersecurity Breaches Data Breaches Denial Of Service (DOS) Devaluation Of Trade Name Disaster Recovery Distributed Denial of Service (DDOS) Identity Theft Increased Cost to Raise Debt Insurance Premium Intellectual Property Operational Disruption Patent Post-Breach Customer protection Recovery Point Objective (RPO) Recovery Time Objective (RTO) Regulatory Compliance Risk assessment Service Level Agreement Stuxnet Trade Secret
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部