Computer Fraud and Security最新文献

筛选
英文 中文
Are we smart enough for smart technology? 我们是否足够聪明,能够接受智能技术?
Computer Fraud and Security Pub Date : 2023-05-01 DOI: 10.12968/s1361-3723(23)70021-3
Sareena Heer, S. Alghamdi, S. Furnell
{"title":"Are we smart enough for smart technology?","authors":"Sareena Heer, S. Alghamdi, S. Furnell","doi":"10.12968/s1361-3723(23)70021-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70021-3","url":null,"abstract":"It's common to find any number of ‘smart’ devices in the modern home, with the most common being so-called smart speakers. Despite their huge popularity, people often view these devices with at least some degree of suspicion, with concerns about security and privacy. With this in mind, this article presents the details of a study conducted among current smart speaker users to examine their awareness and understanding of the security and privacy aspects of the devices that they are already using.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"163 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83146149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The J-L of cyber security 网络安全的J-L
Computer Fraud and Security Pub Date : 2023-04-01 DOI: 10.12968/s1361-3723(23)70018-3
K. Renaud
{"title":"The J-L of cyber security","authors":"K. Renaud","doi":"10.12968/s1361-3723(23)70018-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70018-3","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81794286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud as a malware infiltration channel 云作为恶意软件渗透的渠道
Computer Fraud and Security Pub Date : 2023-04-01 DOI: 10.12968/s1361-3723(23)70016-x
Raymond Canzanese
{"title":"Cloud as a malware infiltration channel","authors":"Raymond Canzanese","doi":"10.12968/s1361-3723(23)70016-x","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70016-x","url":null,"abstract":"It sometimes seems like everything is moving to the cloud, from the apps we use on our phones to major enterprise infrastructure. The result is that your IT landscape is always, to some extent, hybrid, with connections out to, and in from, the cloud at multiple points. The question you need to ask is whether this is opening up holes in your defences by exploiting channels and protocols that you inherently trust. This article examines the increasing popularity of cloud apps as a malware infiltration channel based on real-world data, and highlights potential mitigation strategies.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86535375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Squeezing the security budget 安保预算吃紧
Computer Fraud and Security Pub Date : 2023-04-01 DOI: 10.12968/s1361-3723(23)70017-1
Steve Mansfield-Devine
{"title":"Squeezing the security budget","authors":"Steve Mansfield-Devine","doi":"10.12968/s1361-3723(23)70017-1","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70017-1","url":null,"abstract":"Organisations currently face huge economic pressures, and many of them are having to cut their budgets. But is cyber security really something you can afford to skimp on? And if savings have to be made, are there ways you can spend your security dollar more wisely?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85768436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing a shared SOC 开发共享SOC
Computer Fraud and Security Pub Date : 2023-04-01 DOI: 10.12968/s1361-3723(23)70019-5
Martin Walsham
{"title":"Developing a shared SOC","authors":"Martin Walsham","doi":"10.12968/s1361-3723(23)70019-5","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70019-5","url":null,"abstract":"A security operations centre (SOC) provides a critical security function to detect and defend from cyber security attacks. It is the last line of defence as part of an organisation's overall security control set. But not every organisation can, or should, run its own SOC.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91280434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Getting ahead of the attackers 赶在攻击者前面
Computer Fraud and Security Pub Date : 2023-03-01 DOI: 10.12968/s1361-3723(23)70011-0
D. Garcia
{"title":"Getting ahead of the attackers","authors":"D. Garcia","doi":"10.12968/s1361-3723(23)70011-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70011-0","url":null,"abstract":"Security is often reactive – responding to new forms of attack and trying to patch vulnerabilities before threat actors exploit them. It often seems difficult to get ahead of the curve, to secure the organisation in a considered and systematic way, rather than just firefighting the latest disaster.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"63 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80183692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Brace for an uptick in insider fraud 准备好迎接内幕欺诈的上升吧
Computer Fraud and Security Pub Date : 2023-03-01 DOI: 10.12968/s1361-3723(23)70012-2
Omri Kletter
{"title":"Brace for an uptick in insider fraud","authors":"Omri Kletter","doi":"10.12968/s1361-3723(23)70012-2","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70012-2","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"71 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90618383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why is zero trust so difficult? 为什么零信任这么难?
Computer Fraud and Security Pub Date : 2023-03-01 DOI: 10.12968/s1361-3723(23)70014-6
Phil Robinson
{"title":"Why is zero trust so difficult?","authors":"Phil Robinson","doi":"10.12968/s1361-3723(23)70014-6","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70014-6","url":null,"abstract":"A zero-trust architecture offers significant security benefits and has become one of the most-discussed topics in information security. It's proven to offer high levels of breach prevention and has been shown to greatly reduce the costs of those organisations that are breached. So why is full adoption so slow, even among those organisations that have embraced the concept?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81135790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber insurance is no longer optional 网络保险不再是可有可无的选择
Computer Fraud and Security Pub Date : 2023-03-01 DOI: 10.12968/s1361-3723(23)70015-8
M. Warren
{"title":"Cyber insurance is no longer optional","authors":"M. Warren","doi":"10.12968/s1361-3723(23)70015-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70015-8","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82549084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Now is the time to invest in cyber 现在是投资网络的时候了
Computer Fraud and Security Pub Date : 2023-03-01 DOI: 10.12968/s1361-3723(23)70013-4
Miri Marciano
{"title":"Now is the time to invest in cyber","authors":"Miri Marciano","doi":"10.12968/s1361-3723(23)70013-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70013-4","url":null,"abstract":"Cyber threats are not new, but the scale of the attacks we're seeing and the damage they are causing is unprecedented. If you haven't already put in place cyber defences, your organisation is at risk and may be facing an existential threat. This means that everyone who has been putting off investing in information security solutions needs to reconsider – and quickly.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90235307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信