Infosecurity最新文献

筛选
英文 中文
The CISO Pilgrimage CISO之旅
Infosecurity Pub Date : 2011-05-01 DOI: 10.1016/S1754-4548(11)70034-1
Wendy M. Grossman
{"title":"The CISO Pilgrimage","authors":"Wendy M. Grossman","doi":"10.1016/S1754-4548(11)70034-1","DOIUrl":"10.1016/S1754-4548(11)70034-1","url":null,"abstract":"<div><p>In much the same way that the role of a CISO has evolved, so has the journey to get there. Wendy M. Grossman looks at what steps an aspiring CISO must take to get themselves from school to the board room</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Pages 16-19"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70034-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120307847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Life After Breach 违约后的生活
Infosecurity Pub Date : 2011-05-01 DOI: 10.1016/S1754-4548(11)70037-7
Stephen Pritchard
{"title":"Life After Breach","authors":"Stephen Pritchard","doi":"10.1016/S1754-4548(11)70037-7","DOIUrl":"10.1016/S1754-4548(11)70037-7","url":null,"abstract":"<div><p>With the RSA security breach still fresh in the minds of information security practitioners across the world, you'd be forgiven for assuming that the heyday for token-based ID is long gone. Stephen Pritchard investigates the advantages and disadvantages of token-based ID and finds out why, for now at least, it's here to stay</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 3","pages":"Pages 28-31"},"PeriodicalIF":0.0,"publicationDate":"2011-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70037-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83057412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time to Avoid the Droid? 是时候避开机器人了?
Infosecurity Pub Date : 2011-03-01 DOI: 10.1016/S1754-4548(11)70018-3
Drew Amorosi
{"title":"Time to Avoid the Droid?","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70018-3","DOIUrl":"10.1016/S1754-4548(11)70018-3","url":null,"abstract":"<div><p>Finally, hype has matched reality in the world of mobile security. Drew Amorosi chronicles the recent ups and downs of the bustling Android Market to find out why it is in the crosshairs of the security industry</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Pages 6-9"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70018-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74091769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Slack Space 松弛的空间
Infosecurity Pub Date : 2011-03-01 DOI: 10.1016/S1754-4548(11)70030-4
{"title":"Slack Space","authors":"","doi":"10.1016/S1754-4548(11)70030-4","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70030-4","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Page 48"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70030-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136532710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Gods of Phishing 钓鱼之神
Infosecurity Pub Date : 2011-03-01 DOI: 10.1016/S1754-4548(11)70023-7
Esther Shein
{"title":"The Gods of Phishing","authors":"Esther Shein","doi":"10.1016/S1754-4548(11)70023-7","DOIUrl":"10.1016/S1754-4548(11)70023-7","url":null,"abstract":"<div><p>Some phishing attempts are truly ethereal – near flawless representations of official communications. Others, however, are mere mortals. And then there's the absolutely absurd. Esther Shein visits the pantheon of scammer emails</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Pages 28-31"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70023-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91461572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Rise and Fall of Online Credit Fraud 在线信用欺诈的兴衰
Infosecurity Pub Date : 2011-03-01 DOI: 10.1016/S1754-4548(11)70022-5
Stephen Pritchard
{"title":"The Rise and Fall of Online Credit Fraud","authors":"Stephen Pritchard","doi":"10.1016/S1754-4548(11)70022-5","DOIUrl":"10.1016/S1754-4548(11)70022-5","url":null,"abstract":"<div><p>While Chip and Pin technology has certainly decreased in-store fraud, it has also re-directed criminals' attention to online banks and shoppers. Stephen Pritchard investigates what methods cybercriminals<span> are using to steal credit card data, and reports on how the finance sector is fighting back</span></p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Pages 24-27"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70022-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76724617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The World's Dumbest Hackers 世界上最愚蠢的黑客
Infosecurity Pub Date : 2011-03-01 DOI: 10.1016/S1754-4548(11)70020-1
Danny Bradbury
{"title":"The World's Dumbest Hackers","authors":"Danny Bradbury","doi":"10.1016/S1754-4548(11)70020-1","DOIUrl":"10.1016/S1754-4548(11)70020-1","url":null,"abstract":"<div><p>The world's smartest hackers are often the dumbest. Danny Bradbury introduces the seven deadly sins of hacking, and finds out what happens when a hacker's heart rules their head</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Pages 16-19"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70020-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"99862118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Is Key Management the New Compliance? 密钥管理是新的合规性吗?
Infosecurity Pub Date : 2011-03-01 DOI: 10.1016/S1754-4548(11)70027-4
Jon Geater Thales
{"title":"Is Key Management the New Compliance?","authors":"Jon Geater Thales","doi":"10.1016/S1754-4548(11)70027-4","DOIUrl":"10.1016/S1754-4548(11)70027-4","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Page 44"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70027-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"104044239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Researching the Researchers 研究研究人员
Infosecurity Pub Date : 2011-03-01 DOI: 10.1016/S1754-4548(11)70026-2
Wendy M. Grossman
{"title":"Researching the Researchers","authors":"Wendy M. Grossman","doi":"10.1016/S1754-4548(11)70026-2","DOIUrl":"10.1016/S1754-4548(11)70026-2","url":null,"abstract":"<div><p>The security industry doesn't have it easy. For every virus it detects and prevents, several new ones are being designed for maximum impact and damage. Information security researchers are up against a deluge of malware writers. Wendy M. Grossman reports on how they keep up</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Pages 40-43"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70026-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80556031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Infosec Market in China: Proceed with Caution 中国的信息安全市场:谨慎行事
Infosecurity Pub Date : 2011-03-01 DOI: 10.1016/S1754-4548(11)70025-0
Kevin Townsend
{"title":"The Infosec Market in China: Proceed with Caution","authors":"Kevin Townsend","doi":"10.1016/S1754-4548(11)70025-0","DOIUrl":"10.1016/S1754-4548(11)70025-0","url":null,"abstract":"<div><p>Set to become the second largest economy in the world, China has the money and the people to make information security companies very profitable indeed. Kevin Townsend investigates the Chinese data and privacy culture and the regulations that make ‘cracking’ China a huge challenge for information security businesses</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Pages 35-38"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70025-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85832031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信