Computer Fraud and Security最新文献

筛选
英文 中文
Good cyber security governance is crucial for us all 良好的网络安全治理对我们所有人都至关重要
Computer Fraud and Security Pub Date : 2023-08-01 DOI: 10.12968/s1361-3723(23)70038-9
Corey Nachreiners
{"title":"Good cyber security governance is crucial for us all","authors":"Corey Nachreiners","doi":"10.12968/s1361-3723(23)70038-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70038-9","url":null,"abstract":"It's time we moved on from the traditional focus on technical and operational controls that IT teams need to deploy to defend against attack, and adopt a proper cyber security governance programme.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82749628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new age of cyber: transitioning from security to safety 网络新时代:从安全过渡到安全
Computer Fraud and Security Pub Date : 2023-08-01 DOI: 10.12968/s1361-3723(23)70036-5
G. Golan
{"title":"A new age of cyber: transitioning from security to safety","authors":"G. Golan","doi":"10.12968/s1361-3723(23)70036-5","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70036-5","url":null,"abstract":"As we shift further and further into the digital realm, the threats that face us are outpacing even the most aggressive digital transformation efforts. For businesses, tackling security is no longer a matter of making IT systems more robust – it is about the safety of the entire organisation.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82203476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Don't blame people – fix the system 不要责怪别人,修复系统
Computer Fraud and Security Pub Date : 2023-08-01 DOI: 10.12968/s1361-3723(23)70035-3
Christine Bejerasco
{"title":"Don't blame people – fix the system","authors":"Christine Bejerasco","doi":"10.12968/s1361-3723(23)70035-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70035-3","url":null,"abstract":"It's easy to blame people when security incidents occur. But while many types of breaches do indeed involve a human element, we should stop to ask ourselves why people acted in the ways they did, and why that was allowed to become a problem. Our systems and processes need to be designed with security embedded deeply within them so that minor lapses on the part of staff members are prevented from becoming a problem.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80216925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coming to terms with DORA 和朵拉达成协议
Computer Fraud and Security Pub Date : 2023-08-01 DOI: 10.12968/s1361-3723(23)70037-7
D. Morgan
{"title":"Coming to terms with DORA","authors":"D. Morgan","doi":"10.12968/s1361-3723(23)70037-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70037-7","url":null,"abstract":"The European Union's Digital Operational Resilience Act (DORA) tackles what is currently seen as a weak element in the financial sector – third-party tech suppliers. But does it affect you? And if so, how should you respond?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"91 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81251050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
They walk among us: AI-based social engineering attacks 它们就在我们中间:基于人工智能的社会工程攻击
Computer Fraud and Security Pub Date : 2023-08-01 DOI: 10.12968/s1361-3723(23)70040-7
Samudhra Sendhil
{"title":"They walk among us: AI-based social engineering attacks","authors":"Samudhra Sendhil","doi":"10.12968/s1361-3723(23)70040-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70040-7","url":null,"abstract":"Cyber criminals have not been slow to see the benefits of artificial intelligence. They have adopted generative AI as a means to improve their credibility and success rate in social engineering attacks. So how do you detect this abuse of AI, and what do you do about it?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"108 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83441654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Think NIS2 isn't relevant to you? Think again 认为NIS2与你无关?再想想
Computer Fraud and Security Pub Date : 2023-08-01 DOI: 10.12968/s1361-3723(23)70039-0
Graham Hawkey
{"title":"Think NIS2 isn't relevant to you? Think again","authors":"Graham Hawkey","doi":"10.12968/s1361-3723(23)70039-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70039-0","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"74 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86299646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why cyber insurance has an image problem 为什么网络保险存在形象问题
Computer Fraud and Security Pub Date : 2023-07-01 DOI: 10.12968/s1361-3723(23)70030-4
Shari Gardner
{"title":"Why cyber insurance has an image problem","authors":"Shari Gardner","doi":"10.12968/s1361-3723(23)70030-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70030-4","url":null,"abstract":"For many organisations, cyber insurance is a tricky subject. The cost can be a disincentive, the process of insuring can be complex and it seems there is an increasing list of circumstances under which insurers will not pay out. But given the threats that all organisations face, can you really risk not being insured?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"12 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72484146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SOAR isn't a silver bullet SOAR并不是灵丹妙药
Computer Fraud and Security Pub Date : 2023-07-01 DOI: 10.12968/s1361-3723(23)70032-8
Tim Wallen
{"title":"SOAR isn't a silver bullet","authors":"Tim Wallen","doi":"10.12968/s1361-3723(23)70032-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70032-8","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87710166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A single point of failure? AI and network detection and response 单点故障?人工智能和网络检测与响应
Computer Fraud and Security Pub Date : 2023-07-01 DOI: 10.12968/s1361-3723(23)70031-6
Jacques de la Rivière
{"title":"A single point of failure? AI and network detection and response","authors":"Jacques de la Rivière","doi":"10.12968/s1361-3723(23)70031-6","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70031-6","url":null,"abstract":"Artificial intelligence is creeping into everything, including network detection and response (NDR). But is faith in the new technology blinding us to some serious deficiencies and possible vulnerabilities?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74915463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social engineering the dispersed workforce 社会工程分散劳动力
Computer Fraud and Security Pub Date : 2023-07-01 DOI: 10.12968/s1361-3723(23)70033-x
C. Scott
{"title":"Social engineering the dispersed workforce","authors":"C. Scott","doi":"10.12968/s1361-3723(23)70033-x","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70033-x","url":null,"abstract":"The workplace has gone through a forced and dramatic change. Remote and hybrid working have been normalised, putting a huge strain on the technology infrastructures that support them and rendering many of our traditional cyber defences obsolete. Of all the threats that face today's workforce, social engineering is arguably the most pernicious and difficult to mitigate.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86482503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信