Computer Fraud and Security最新文献

筛选
英文 中文
The psychological problem with ransomware 勒索软件的心理问题
Computer Fraud and Security Pub Date : 2022-12-01 DOI: 10.12968/s1361-3723(22)70605-7
Bec McKeown
{"title":"The psychological problem with ransomware","authors":"Bec McKeown","doi":"10.12968/s1361-3723(22)70605-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70605-7","url":null,"abstract":"Our fears about being targeted by a cyber attack are understood – and exploited – by malicious actors. This is why, in building your defences against attacks – especially ransomware – you need to consider the psychological factors.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"225 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90071152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why do we silo cyber security when criminals don't? 为什么我们把网络安全隔离起来,而罪犯却没有?
Computer Fraud and Security Pub Date : 2022-12-01 DOI: 10.12968/s1361-3723(22)70603-3
G. Golan
{"title":"Why do we silo cyber security when criminals don't?","authors":"G. Golan","doi":"10.12968/s1361-3723(22)70603-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70603-3","url":null,"abstract":"Organisations rely on a number of suppliers to provide a wide range of security solutions and services. This creates complexity that attackers can exploit. So what can we do about this?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83898965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimising fraud in a post-Covid world 在后新冠时代最大限度地减少欺诈
Computer Fraud and Security Pub Date : 2022-11-01 DOI: 10.12968/s1361-3723(22)70600-8
James Richardson
{"title":"Minimising fraud in a post-Covid world","authors":"James Richardson","doi":"10.12968/s1361-3723(22)70600-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70600-8","url":null,"abstract":"Working from home has increased fraud in the UK and the US. At the same time, the amount and value of fraud has increased, according to recent figures. This means that companies must be extra-vigilant as our ways of working continue to evolve.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88948800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new era of bank security challenges 银行安全面临新时代的挑战
Computer Fraud and Security Pub Date : 2022-11-01 DOI: 10.12968/s1361-3723(22)70602-1
Matt Tengwall
{"title":"A new era of bank security challenges","authors":"Matt Tengwall","doi":"10.12968/s1361-3723(22)70602-1","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70602-1","url":null,"abstract":"Beyond the human toll exacted by the Covid-19 pandemic, one of the most significant lasting impacts of the spread of the virus and its numerous variants will be how it fundamentally changed business operations for many industries, and banking is no exception. As work and consumer habits due to the pandemic, financial institutions must evolve their security programmes accordingly.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81390850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the organisation by protecting the individual 通过保护个人来保护组织
Computer Fraud and Security Pub Date : 2022-11-01 DOI: 10.12968/s1361-3723(22)70599-4
Katie Petrillo
{"title":"Securing the organisation by protecting the individual","authors":"Katie Petrillo","doi":"10.12968/s1361-3723(22)70599-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70599-4","url":null,"abstract":"The whole world has gone through a digital transformation, radically changing the nature of work. But are individual employees properly prepared for this change? And are they being given the protections they need to keep themselves – and the organisations they work for – safe?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"61 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78045230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preventing ransomware – doing the impossible? 防止勒索软件——做不可能的事?
Computer Fraud and Security Pub Date : 2022-11-01 DOI: 10.12968/s1361-3723(22)70598-2
Henry b. Harrison
{"title":"Preventing ransomware – doing the impossible?","authors":"Henry b. Harrison","doi":"10.12968/s1361-3723(22)70598-2","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70598-2","url":null,"abstract":"As cyber criminals and their tools become more sophisticated, organisations are becoming increasingly reliant on their first line of defence – their staff – to combat threats. This requires a high level of awareness. But is it reasonable to expect employees to have such an advanced understanding of the dangers?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90835648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mind the gap between cyber security spend, budgets and awareness 注意网络安全支出、预算和意识之间的差距
Computer Fraud and Security Pub Date : 2022-11-01 DOI: 10.12968/s1361-3723(22)70601-x
Erick Barnes
{"title":"Mind the gap between cyber security spend, budgets and awareness","authors":"Erick Barnes","doi":"10.12968/s1361-3723(22)70601-x","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70601-x","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72945719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The rise of phishing: what your staff needs to know 网络钓鱼的兴起:你的员工需要知道什么
Computer Fraud and Security Pub Date : 2022-10-01 DOI: 10.12968/s1361-3723(22)70595-7
{"title":"The rise of phishing: what your staff needs to know","authors":"","doi":"10.12968/s1361-3723(22)70595-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70595-7","url":null,"abstract":"Phishing attacks have surged in waves over the past 18 months, capitalising on the fear and uncertainty caused by the Covid-19 pandemic. Yet these media-publicised waves overshadow the fact that phishing attacks, year over year, have continued their inevitable climb to reach peak numbers through pandemic-related topics","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88707008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Slow down and frown to improve phishing detection 慢下来,皱眉,提高网络钓鱼检测
Computer Fraud and Security Pub Date : 2022-10-01 DOI: 10.12968/s1361-3723(22)70593-3
Patricia A. Nevin, K. Renaud, George Finney
{"title":"Slow down and frown to improve phishing detection","authors":"Patricia A. Nevin, K. Renaud, George Finney","doi":"10.12968/s1361-3723(22)70593-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70593-3","url":null,"abstract":"The move to ‘digital first’ has led to increasing dependence on online services, which increases susceptibility to security incidents. 1 Human behaviours can compromise organisational information security, with myriad perpetrators willing to exploit the human propensity to trust in order to achieve such compromises. 2 Phishing emails – which present recipients with an email containing a fraudulent link or a rogue attachment that can lead to the installation of malware or facilitate a ransomware attack – are a key attack vector. But encouraging users to slow down when processing emails can help combat this threat.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"321 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80233111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Waking up to the encryption advantage 意识到加密的优势
Computer Fraud and Security Pub Date : 2022-10-01 DOI: 10.12968/s1361-3723(22)70594-5
J. Fielding
{"title":"Waking up to the encryption advantage","authors":"J. Fielding","doi":"10.12968/s1361-3723(22)70594-5","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70594-5","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74618611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信