Computer Fraud and Security最新文献

筛选
英文 中文
Six steps to dealing with a ransomware attack 应对勒索软件攻击的六个步骤
Computer Fraud and Security Pub Date : 2023-10-01 DOI: 10.12968/s1361-3723(23)70047-x
Chris Dimitriadis
{"title":"Six steps to dealing with a ransomware attack","authors":"Chris Dimitriadis","doi":"10.12968/s1361-3723(23)70047-x","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70047-x","url":null,"abstract":"No organisation is safe from ransomware, and the threat it poses is only becoming more widespread and severe. However, there are ways to prepare yourself for an attack, and for dealing with the consequences once it occurs. Being ready can significantly reduce the impact when ransomware strikes.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incident response: are alert levels now unmanageable? 事件响应:警报级别现在是否无法管理?
Computer Fraud and Security Pub Date : 2023-10-01 DOI: 10.12968/s1361-3723(23)70050-x
Brian Martin
{"title":"Incident response: are alert levels now unmanageable?","authors":"Brian Martin","doi":"10.12968/s1361-3723(23)70050-x","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70050-x","url":null,"abstract":"Computer Fraud & SecurityVol. 2023, No. 10 The SandboxIncident response: are alert levels now unmanageable?Brian MartinBrian MartinIntegrity360Search for more papers by this authorBrian MartinPublished Online:31 Oct 2023https://doi.org/10.12968/S1361-3723(23)70050-XAboutSectionsView articleView Full TextView EPUB ToolsAdd to favoritesDownload CitationsTrack CitationsPermissions ShareShare onFacebookTwitterLinked InEmail View article References 1. Coutinho, S et al.. ‘Cyber security skills in the UK labour market 2023’. Department for Science, Innovation and Technology (DSIT). Accessed Oct 2023. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1173325/Cyber_security_skills_in_the_UK_labour_market_2023.pdf Google Scholar2. ‘Global Incident Response Threat Report’. VMware, 2022. Accessed Oct 2023. www.vmware.com/content/dam/learn/en/amer/fy23/pdf/1553238_Global_Incident_Response_Threat_Report_Weathering_The_Storm.pdf. Google Scholar3. ‘Gartner predicts nearly half of cyber security leaders will change jobs by 2025’. Gartner, 22 Feb 2023. Accessed Oct 2023. www.gartner.com/en/newsroom/press-releases/2023-02-22-gartner-predicts-nearly-half-of-cyber security-leaders-will-change-jobs-by-2025. Google Scholar FiguresReferencesRelatedDetails 1 October 2023Volume 2023Issue 10ISSN (print): 1361-3723ISSN (online): 1873-7056 Metrics History Published online 31 October 2023 Published in print 1 October 2023 Information© MA Business Ltd.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing cyber security coverage in non-computing disciplines 评估非计算学科的网络安全覆盖范围
Computer Fraud and Security Pub Date : 2023-10-01 DOI: 10.12968/s1361-3723(23)70048-1
Steven Furnell, Eliana Stavrou
{"title":"Assessing cyber security coverage in non-computing disciplines","authors":"Steven Furnell, Eliana Stavrou","doi":"10.12968/s1361-3723(23)70048-1","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70048-1","url":null,"abstract":"Cyber security is now the concern and responsibility of everyone who uses technology, regardless of whether they are IT or security practitioners. And this needs to be reflected in education. There are many disciplines, not directly related to cyber security, where knowledge of the threats and the basic skills to combat them are becoming necessary if graduates are to fully contribute to a society safe from cyber risks.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The challenges of data sovereignty 数据主权的挑战
Computer Fraud and Security Pub Date : 2023-10-01 DOI: 10.12968/s1361-3723(23)70049-3
Simon Pamplin
{"title":"The challenges of data sovereignty","authors":"Simon Pamplin","doi":"10.12968/s1361-3723(23)70049-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70049-3","url":null,"abstract":"Any companies still adopting a tech-first strategy for cyber security are entirely misunderstanding the intentions of global data protection regulation – and as a result are leaving both individuals and the business dangerously exposed. There are broader issues of data governance, including data sovereignty, that involve the whole of the organisation's management team.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136128930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving national security through accountability 通过问责制加强国家安全
Computer Fraud and Security Pub Date : 2023-10-01 DOI: 10.12968/s1361-3723(23)70046-8
Pieter Danhieux
{"title":"Improving national security through accountability","authors":"Pieter Danhieux","doi":"10.12968/s1361-3723(23)70046-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70046-8","url":null,"abstract":"The cyber security of an organisation starts with the software it uses. And that places a responsibility on software vendors to ensure that the code they ship is intrinsically secure. And that security can't be added as an afterthought – it needs to be integrated deep into the development process.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
To get the best value out of data, you have to protect it 为了从数据中获得最大的价值,您必须保护它
Computer Fraud and Security Pub Date : 2023-09-01 DOI: 10.12968/s1361-3723(23)70042-0
Jason Foster
{"title":"To get the best value out of data, you have to protect it","authors":"Jason Foster","doi":"10.12968/s1361-3723(23)70042-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70042-0","url":null,"abstract":"It has become a truism that data is the lifeblood of any modern organisation. But to reap the maximum value from data, you have to use it – and that makes it vulnerable. But this means you should view implementing an effective data security as a business investment – unlocking the potential of your data while keeping the organisation safe.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"373 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134916067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adding AI to NDR in the face of current threats 在面对当前威胁时,将AI添加到NDR中
Computer Fraud and Security Pub Date : 2023-09-01 DOI: 10.12968/s1361-3723(23)70043-2
Jacques de la Rivière
{"title":"Adding AI to NDR in the face of current threats","authors":"Jacques de la Rivière","doi":"10.12968/s1361-3723(23)70043-2","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70043-2","url":null,"abstract":"Threat actors exhibit highly agile behaviour, capable of evolving and adapting as new vulnerabilities become evident. Most organisations, however, don't have the same kind of flexibility and are constantly fighting last year's battles. Network detection and response (NDR) solutions have arisen to tackle this problem, and now with the added power of artificial intelligence they have the potential to give organisations the ability to react and respond quickly to new threats.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134916068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How providers can help SMBs navigate the rising tide of attacks 供应商如何帮助中小企业应对不断上升的攻击浪潮
Computer Fraud and Security Pub Date : 2023-09-01 DOI: 10.12968/s1361-3723(23)70045-6
Darren Williams
{"title":"How providers can help SMBs navigate the rising tide of attacks","authors":"Darren Williams","doi":"10.12968/s1361-3723(23)70045-6","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70045-6","url":null,"abstract":"In the vast, ever-changing threat landscape that encompasses the cyber world, small-to-medium businesses (SMBs) find themselves in a particularly vulnerable position. The paradox of the digital economy is that while it opens unparalleled opportunities for SMBs, it also exposes them to a landscape of cyber security threats that are both complex and continually evolving.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134916065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Are we ready for the next WannaCry? 我们准备好迎接下一个“想哭”了吗?
Computer Fraud and Security Pub Date : 2023-09-01 DOI: 10.12968/s1361-3723(23)70041-9
Mark Cunningham-Dickie
{"title":"Are we ready for the next WannaCry?","authors":"Mark Cunningham-Dickie","doi":"10.12968/s1361-3723(23)70041-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70041-9","url":null,"abstract":"The WannaCry and NotPetya attacks alerted the world to the massive disruption that can be caused by cyber attacks. They also highlighted weaknesses and a lack of investment in our defences. Since then, the threats we face have moved on, having become significantly more sophisticated not least due to the exploitation of artificial intelligence and machine learning. So are we ready for the next big attack?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134916362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The good and bad of generative AI 生成式AI的好与坏
Computer Fraud and Security Pub Date : 2023-09-01 DOI: 10.12968/s1361-3723(23)70044-4
Bernard Montel
{"title":"The good and bad of generative AI","authors":"Bernard Montel","doi":"10.12968/s1361-3723(23)70044-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70044-4","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134916359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信