首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   8篇
  免费   0篇
教育   2篇
科学研究   2篇
综合类   1篇
信息传播   3篇
  2021年   1篇
  2020年   4篇
  2019年   1篇
  2017年   1篇
  2013年   1篇
排序方式: 共有8条查询结果,搜索用时 109 毫秒
1
1.
Emerging paradigms of attack challenge enterprise cybersecurity with sophisticated custom-built tools, unpredictable patterns of exploitation, and an increasing ability to adapt to cyber defenses. As a result, organizations continue to experience incidents and suffer losses. The responsibility to respond to cybersecurity incidents lies with the incident response (IR) function. We argue that (1) organizations must develop ‘agility’ in their IR process to respond swiftly and efficiently to sophisticated and potent cyber threats, and (2) Real-time analytics (RTA) gives organizations a unique opportunity to drive their IR process in an agile manner by detecting cybersecurity incidents quickly and responding to them proactively. To better understand how organizations can use RTA to enable IR agility, we analyzed in-depth data from twenty expert interviews using a contingent resource-based view. The results informed a framework explaining how organizations enable agile characteristics (swiftness, flexibility, and innovation) in the IR process using the key features of the RTA capability (complex event processing, decision automation, and on-demand and continuous data analysis) to detect and respond to cybersecurity incidents as-they-occur which, in turn, improves their overall enterprise cybersecurity performance.  相似文献   
2.
The Invisible Web—defined as Web information that cannot be found by using general-purpose search engines—has been studied primarily as an access issue. In this article, the authors consider, for the first time, the economic and political implications of the Invisible Web. The article is divided into two parts; the first looks at the “open” Web, accessible through URLs, while the second delves into the Dark Web, hidden behind veils of anonymity. The two main questions asked are: How is the Invisible Web shaped by economic and political factors and how, in turn, does the Invisible Web shape those circumstances? With the answers to these questions, the authors hope to bring more awareness of the Invisible Web to the information literacy classroom.  相似文献   
3.
为了能够动态测评用户网络空间安全理论和实践水平,基于B/S架构模式,并结合Flask框架和SQLite3数据库技术设计了一种动态测评系统。该系统支持个人和团体的动态测评模式,可以使用户在自己喜好的主题场景中扮演相应的角色,凭借缜密推理和齐心协作,实现网络空间安全动态化的测评。通过动态测评使用户了解自身在网络空间安全知识方面的不足点,帮助用户提升网络空间安全方面的能力。  相似文献   
4.
随着信息技术的迅速发展,计算机和网络给青少年生活带来诸多便利,同时也引发了系列网络安全问题。澳大利亚作为世界上较早关注网络安全的国家之一,受国家安全理念、网络安全形势和国际国内政策等因素的影响,在青少年网络安全应对方面进行了较长时期的探索。其中,在网络安全教育领域,主要依托网络安全专员办公室,围绕网络信息识别、网络活动参与和网络问题应对等,进行青少年网络安全课程建设。逐步形成了基于学习者需求、注重能力培养,开展多向交流、注重问题解决,优化课程资源配置、注重课程拓展等特征,对于提升青少年网络安全素养起到了有效的促进作用。  相似文献   
5.
This article presents the growth of cybersecurity education on American college campuses as a challenge and an opportunity for all librarians to liaise across schools and departments. Drawing on the experiences of one business and systems librarian serving as library liaison to the College of Business and the newly formed Cyber Institute at Augusta University, this article details the challenges of organizing to liaise with disparate constituencies in a new and rapidly growing subject area. In addition, it looks at the effects that the establishment of Army Cyber Command and the new cybersecurity studies program can have on librarianship now and in the future. Finally, this article considers the usefulness of this new liaison model in light of current and future innovations in higher education.  相似文献   
6.
《网络安全法》规定我国实行网络安全等级保护制度(以下简称等保制度)。高校拥有大量信息资产,是国家网络空间安全的重要阵地。为贯彻执行等保制度,将等保工作管理过程规范化、流程化和信息化,设计并实现网络安全等级保护支撑系统。该系统涵盖定级备案、等保测评、建设整改、安全监测、安全通报等多个等保工作环节,包括多级权限管理、知识库、文档报告快速生成等特色功能。通过该系统可顺利完成 8 个二级等保系统备案工作。  相似文献   
7.
Internet of Things (IoT) is ubiquitous in society. IoT-enabled dynamic capabilities in real-time sensing and responding can spur digital transformation in unlocking the potential of digital government into data-driven smart government capable of delivering policies and services of public interest and public value. However, the literature indicates challenges in IoT cybersecurity and systemic use across the government. There is the urgent need for IoT research on policy and use. This paper developed a framework for IoT-enabled smart government performance. We applied this framework to conduct case study analyses of digital technology policy, IoT cybersecurity policy, and IoT use in major application domains at the U.S. federal government level. The results show that some agencies were strategic and forward-thinking in funding and partnering with sub-national governments in promoting the IoT use. However, there remains a critical need for national IoT policies to promote systemic IoT use across the application domains.  相似文献   
8.
网络强国战略思想下网络安全人才的培养模式日益成为学术界与实践界共同关注的话题,深入探究就业市场对网络安全人才的需求特征,有助于为完善网络安全人才培养模式提供现实依据。本研究以企业招聘广告为样本,采用内容分析法从企业视角分析了我国就业市场对网络安全人才的任职要求。研究结果表明,我国企业对网络安全人才的任职要求可归纳为专业资历要求、知识要求、技能要求及职业素养要求4个维度,共计18项任职特征。研究结果为我国网络安全人才培养改革和网络安全专业学生自我素质提升提供了一种思路。  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号