Deceptive security to protect your business

被引:0
|
作者
Chambareau E. [1 ]
机构
[1] Airbus CyberSecurity
关键词
D O I
10.12968/S1353-4858(22)70001-3
中图分类号
学科分类号
摘要
Information systems are being increasingly exposed to cyber attacks, intrusion attempts and sophisticated malware. For organisations, one of the main challenges associated with these risks is gaining a better understanding of the actors behind the threats, as well as the methods that they employ. So how can organisations gather information about the specific cyberthreats that they face and improve their threat intelligence strategy? One solution is a honeypot. © 2022 MA Business Ltd.
引用
收藏
相关论文
共 50 条
  • [31] Protect Your Files
    Fastie, W.
    P C Magazine: The Independent Guide to IBM - Standard Personal Computers, 17 (06):
  • [32] Protect your bonds
    Kruger, D
    FORBES, 2002, 169 (13): : 214 - 214
  • [33] Protect your home
    Fitch, Stephane
    FORBES, 2007, 180 (12): : 154 - +
  • [34] Protect your property
    Stone, David
    Packaging Magazine, 2004, 7 (13):
  • [35] Protect your data
    Hoodless, Gill
    McKilligan, Nicola
    Quality World, 1998,
  • [36] Protect your antibodies
    Chajmowicz, Marion
    Carboni, Celine
    BIOFUTUR, 2009, (301) : 64 - 66
  • [37] Protect Your Dream
    斯予
    阅读, 2020, (Z4) : 1 - 1
  • [38] Protect your PC
    Anon
    2002, PCW Communications Inc. (20):
  • [39] Protect your daughters
    Zitzow, L
    NEW SCIENTIST, 2005, 186 (2498) : 28 - 28
  • [40] PROTECT YOUR PROFIT
    不详
    ENGINEERING, 1989, 229 (10): : 60 - 61