{"title":"Are cyber security breaches unavoidable?","authors":"Paul O'Rourke","doi":"10.12968/s1361-3723(22)70591-x","DOIUrl":null,"url":null,"abstract":"The increased likelihood of a security breach is a natural consequence of the widespread availability of an organisation's IT systems and data via digital and mobile technologies. Criminals look for the weakest link in the chain of security, whether it be through applications, an increased number of portal entry points, or an employee who is unaware of the potential danger. So are we at the point where a breach is inevitable?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"67 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Fraud and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1361-3723(22)70591-x","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 0
Abstract
The increased likelihood of a security breach is a natural consequence of the widespread availability of an organisation's IT systems and data via digital and mobile technologies. Criminals look for the weakest link in the chain of security, whether it be through applications, an increased number of portal entry points, or an employee who is unaware of the potential danger. So are we at the point where a breach is inevitable?
期刊介绍:
Computer Fraud & Security has grown with the fast-moving information technology industry and has earned a reputation for editorial excellence with IT security practitioners around the world. Every month Computer Fraud & Security enables you to see the threats to your IT systems before they become a problem. It focuses on providing practical, usable information to effectively manage and control computer and information security within commercial organizations.