首页> 外文期刊>Security electronics & Networks >CYBER SECURITY BEST PRACTICE
【24h】

CYBER SECURITY BEST PRACTICE

机译:网络安全最佳实践

获取原文
获取原文并翻译 | 示例
           

摘要

AT a recent conference, I posed two questions to a large group of people who work with IP video, the answers to which were concerning, though perhaps not surprising. The first question was "Who has read (cover to cover) a cyber security best practice document or hardening guide from ANY IP video manufacturer?" Less than 20 per cent of the room put their hands up. The second question was "Who has deployed an IP video system with security controls based on any hardening guidelines or specifications". In a room of more than 100 people, just 2 people said "yes' and a couple more said 'kind of - that's less than 5 per cent of people deploying security controls in a planned manner, if at all For an industry that deploys what are essentially large computer networks, that's a very concerning response.
机译:在最近的一次会议上,我向一大批使用IP视频的人们提出了两个问题,这些问题的答案令人担忧,尽管也许并不奇怪。第一个问题是“谁读过(覆盖)任何IP视频制造商的网络安全最佳实践文档或强化指南?”不到百分之二十的房间举起手来。第二个问题是“谁部署了基于任何强化指南或规格具有安全控制功能的IP视频系统”。在一个有100多人的房间中,只有2个人说“是”,还有2个人说“有点”-不到按计划部署安全控制措施的人员(如果有的话)的5%。本质上是大型计算机网络,这是一个非常令人担忧的响应。

著录项

  • 来源
    《Security electronics & Networks》 |2017年第392期|56-60|共5页
  • 作者

  • 作者单位
  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号