...
首页> 外文期刊>Port Technology international >ATTACK PATH DISCOVERY: SUPPLY CHAIN SECURITY
【24h】

ATTACK PATH DISCOVERY: SUPPLY CHAIN SECURITY

机译:攻击路径发现:供应链安全

获取原文
获取原文并翻译 | 示例
           

摘要

From Shanghai to Los Angeles, IT services and systems now connect the various infrastructures of the supply chain, creating a complex web of dependencies. Each of these assets could theoretically become entry points for a cyberattack using known or new zero-day exploits. In addition to patching vulnerabilities, cyber defense teams need to take a proactive stance by deploying intrusion detection systems (IDS) to actively sniff out potential threats. Our investment in cyber security has to match if not exceed that spent on physical security measures. Intrusion detection is one of these measures. It relies on accurately monitoring a network for signs of attack. There is no one IDS able to monitor an entire supply chain, which means that each organization has a responsibility to investigate possible vulnerabilities in its networks. This is a huge undertaking since attacks can come in from various local and global networks and affect multiple systems.
机译:从上海到洛杉矶,IT服务和系统现在连接了供应链的各种基础架构,从而创建了复杂的依赖关系网络。从理论上讲,这些资产中的每一项都可以使用已知或新的零时差攻击成为网络攻击的切入点。除了修补漏洞外,网络防御团队还需要采取积极的态度,通过部署入侵检测系统(IDS)来主动发现潜在威胁。我们在网络安全方面的投资必须与物理安全措施上的投资相匹配(如果不超过)。入侵检测是这些措施之一。它依赖于准确监视网络的攻击迹象。没有一个IDS能够监视整个供应链,这意味着每个组织都有责任调查其网络中可能存在的漏洞。这是一项艰巨的任务,因为攻击可能来自各种本地和全球网络,并且会影响多个系统。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号