首页> 外文期刊>SC magazine >Have a realistic discussion
【24h】

Have a realistic discussion

机译:进行现实的讨论

获取原文
获取原文并翻译 | 示例
           

摘要

When it comes to real-time threats, if your executives expect you to prevent all breaches, you're overdue for a talk. First, total prevention of threat infiltration is not realistic. Second, you can't catch everything. Third, security technology by itself won't do much. To address today's cyber-threats, monitoring programs must be based on the assumption that we will get hacked and always have infected systems, and the security team's role is to minimize damage by focusing on top risks. Why is a meeting of the minds with the executives important? One must have their collaboration and input to determine what kinds of cyber threats can most negatively impact the business. Are they more concerned about incurring fines, preventing losses, protecting trade secrets or protecting the brand? They may not understand the factors that contribute to the new landscape. Hackers targeting an organization use a string of techniques to establish an internal base from which to launch data theft or fraud. Botnets and other forms of malware morph and proliferate quickly, and can hide in stealth mode. The variety of endpoint devices that can introduce malware to the network makes total control impossible.
机译:当涉及到实时威胁时,如果您的高管希望您阻止所有违规行为,那么您就该进行演讲了。首先,全面防止威胁渗透是不现实的。其次,您无法捕获所有内容。第三,安全技术本身不会做太多事情。为了应对当今的网络威胁,监视程序必须基于以下假设:我们将被黑客入侵,并且系统始终被感染,并且安全团队的作用是通过关注最大风险来最大程度地减少破坏。为什么与高管见面很重要?必须有他们的协作和投入,以确定哪种类型的网络威胁会对业务产生最不利的影响。他们是否更担心罚款,防止损失,保护商业秘密或保护品牌?他们可能不了解促成新形势的因素。针对组织的黑客使用一系列技术来建立内部基础,从该内部基础上发起数据盗窃或欺诈。僵尸网络和其他形式的恶意软件会迅速扩散并扩散,并可能以隐身模式隐藏。可以将恶意软件引入网络的各种端点设备使完全控制成为不可能。

著录项

  • 来源
    《SC magazine》 |2012年第1期|p.17|共1页
  • 作者

  • 作者单位
  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号