Computer Fraud and Security最新文献

筛选
英文 中文
The importance of security for the crypto industry 安全对加密行业的重要性
Computer Fraud and Security Pub Date : 2022-10-01 DOI: 10.12968/s1361-3723(22)70596-9
Marc Wilczek
{"title":"The importance of security for the crypto industry","authors":"Marc Wilczek","doi":"10.12968/s1361-3723(22)70596-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70596-9","url":null,"abstract":"Cyber attacks are becoming an increasingly important issue in the financial industry. The recent shutdown of the darknet marketplace ‘Hydra Markets’ in April 2022, firmly established cyberthreats as a critical topic within the world of finance. Hydra was a platform that had generated a revenue of €1.2bn by 2020 from illegal business on the Internet. So how strongly is the sensitive environment of the crypto industry affected by cyber attacks, especially DDoS?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78500585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The changing role of the chief compliance officer 首席合规官角色的变化
Computer Fraud and Security Pub Date : 2022-10-01 DOI: 10.12968/s1361-3723(22)70597-0
S. Winchester
{"title":"The changing role of the chief compliance officer","authors":"S. Winchester","doi":"10.12968/s1361-3723(22)70597-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70597-0","url":null,"abstract":"Organisations are constantly challenged to reassess their position in the ever-changing business landscape. As this landscape changes, it arguably has the greatest impact on the role of the chief compliance officer, with the CCO playing an ever more crucial part in navigating the issues raised as a result of functional and operational challenges. Whether it's responding to the additional risks brought on by the pandemic, developing an approach to technology and data analytics that complies with ever-changing regulatory standards, or overseeing a remote or decentralised workforce, this all becomes a priority for the CCO. Amidst this backdrop, CCOs must be adaptable in order to take on a range of responsibilities.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"129 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89613005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using AI to combat fraud in the voice channel 利用人工智能打击语音渠道中的欺诈行为
Computer Fraud and Security Pub Date : 2022-09-01 DOI: 10.12968/s1361-3723(22)70590-8
Amit Gupta
{"title":"Using AI to combat fraud in the voice channel","authors":"Amit Gupta","doi":"10.12968/s1361-3723(22)70590-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70590-8","url":null,"abstract":"Whether it's an attempt to defraud individuals by accessing their bank accounts, or a large-scale attack on an organisation targeting huge volumes of data, identity is at the heart of most sophisticated criminal activity today. And while most online channels have been continually strengthened to stay ahead of evolving criminal tactics, the voice channel – another critical customer connection point – has increasingly come to be seen as a vulnerable target.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"55 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76546679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The future of cyber security 网络安全的未来
Computer Fraud and Security Pub Date : 2022-09-01 DOI: 10.12968/s1361-3723(22)70592-1
Dominik Samociuk
{"title":"The future of cyber security","authors":"Dominik Samociuk","doi":"10.12968/s1361-3723(22)70592-1","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70592-1","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82431656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Are cyber security breaches unavoidable? 网络安全漏洞是不可避免的吗?
Computer Fraud and Security Pub Date : 2022-09-01 DOI: 10.12968/s1361-3723(22)70591-x
Paul O'Rourke
{"title":"Are cyber security breaches unavoidable?","authors":"Paul O'Rourke","doi":"10.12968/s1361-3723(22)70591-x","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70591-x","url":null,"abstract":"The increased likelihood of a security breach is a natural consequence of the widespread availability of an organisation's IT systems and data via digital and mobile technologies. Criminals look for the weakest link in the chain of security, whether it be through applications, an increased number of portal entry points, or an employee who is unaware of the potential danger. So are we at the point where a breach is inevitable?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"67 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86013622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Uncovering data relationships to tackle fraud 揭示数据关系以解决欺诈问题
Computer Fraud and Security Pub Date : 2022-09-01 DOI: 10.12968/s1361-3723(22)70588-x
A. Frame
{"title":"Uncovering data relationships to tackle fraud","authors":"A. Frame","doi":"10.12968/s1361-3723(22)70588-x","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70588-x","url":null,"abstract":"Graph technology has reached a point of maturity where it can run off-the-shelf algorithms over massive networks to discover previously undetectable patterns. These algorithms also permit security professionals to take the necessary actions to render systems more robust and secure. As a result, financial and government institutions are making increasing use of graph database technology to tackle fraud.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"426 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77131291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SASE and the future of IoT security SASE与物联网安全的未来
Computer Fraud and Security Pub Date : 2022-09-01 DOI: 10.12968/s1361-3723(22)70589-1
Martin Giess
{"title":"SASE and the future of IoT security","authors":"Martin Giess","doi":"10.12968/s1361-3723(22)70589-1","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70589-1","url":null,"abstract":"Secure Access Service Edge (SASE) is starting to become mainstream. And this approach promises unified policies that improve agility, fortify security and simplify the network stack – especially when it comes to the Internet of Things (IoT).","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83025193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to maintain control in a regulated environment 如何在受规管的环境中保持控制
Computer Fraud and Security Pub Date : 2022-08-01 DOI: 10.12968/s1361-3723(22)70584-2
Mat Clothier
{"title":"How to maintain control in a regulated environment","authors":"Mat Clothier","doi":"10.12968/s1361-3723(22)70584-2","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70584-2","url":null,"abstract":"From banking to healthcare and pharmaceuticals, a variety of industries are finding themselves subject to ever-multiplying regulations and rules that they must comply with to avoid sanctions and penalties. And the continual accumulation of regulatory changes and updates can leave some organisations struggling to keep pace.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77599421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The G-I of cyber security 网络安全的总称
Computer Fraud and Security Pub Date : 2022-08-01 DOI: 10.12968/s1361-3723(22)70586-6
K. Renaud
{"title":"The G-I of cyber security","authors":"K. Renaud","doi":"10.12968/s1361-3723(22)70586-6","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70586-6","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73861025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The growing need for digital document attestation 对数字文件认证的需求日益增长
Computer Fraud and Security Pub Date : 2022-08-01 DOI: 10.12968/s1361-3723(22)70585-4
M. Sahib
{"title":"The growing need for digital document attestation","authors":"M. Sahib","doi":"10.12968/s1361-3723(22)70585-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70585-4","url":null,"abstract":"Advancing technology and the Covid-19 pandemic have prompted a rise in digital transactions. More sales, contracts and legal agreements have moved online than ever before and that number is only growing. But accompanying this is a rising concern about the security of digital documents, and particularly the robustness of digital document attestation.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88697442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信