期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises 被引量:1
1
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期106-133,共28页
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo... As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm. 展开更多
关键词 Advanced Persistent Threats (APT) Attack Phases Attack Surface DEFENSE-IN-DEPTH Disaster Recovery (DR) Incident Response Plan (IRP) Intrusion Detection Systems (IDS) Intrusion Prevention System (IPS) key Risk Indicator (KRI) Layered Defense Lockheed Martin Kill Chain Proactive Defense Redundancy Risk Management Threat Intelligence
在线阅读 下载PDF
Research on key risk chain mining method for urban rail transit operations: A new approach to risk management
2
作者 Gan Shi Xiaobing Ding +2 位作者 Chen Hong Zhigang Liu Lu Zhao 《International Journal of Transportation Science and Technology》 2024年第1期29-43,共15页
To ensure the safety of urban rail transit operations and uncover the transmission dynam ics of risk sources,a key risk chain mining method for urban rail transit operation is pro posed.Firstly,the H-Apriori associati... To ensure the safety of urban rail transit operations and uncover the transmission dynam ics of risk sources,a key risk chain mining method for urban rail transit operation is pro posed.Firstly,the H-Apriori association rule algorithm is proposed for the characteristics of low frequency but high riskiness of high hazard degree risk sources in urban rail transit operation,which adds a new hazard degree evaluation index to the traditional Apriori algo rithm and couples with support degree two-dimensionally to mine the strong association rules among risk sources.Secondly,we construct a weighted risk network with risk sources as network nodes and strong association rules as network edges,and propose a key risk chain mining method for urban rail transit operation based on path search theory to mine key risk chains from the weighted risk network.Finally,using the actual urban rail transit operation data of a city in China as an example,a total of 17 key risk chains are mined,and then 5 key risk sources and 8 key chain break locations are obtained by riskiness and fre quency analysis of key risk chains,and control plans are proposed.The research outcomes introduce a novel approach to mining risk chains in urban rail transit operations,shedding light on the propagation mechanisms,triggering probabilities,and degrees of unsafety associated with risk sources.The results not only provide theoretical support but also offer methodological guidance for pinpointing locations of risk chain breaks and refining the control of risk sources. 展开更多
关键词 Urban rail transit Risk chain H-Apriori association rule algorithm key risk source Risk control plan
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部