Computer Fraud and Security最新文献

筛选
英文 中文
Passwords: The cyber security lesson that was never learned? 密码:人们从未吸取的网络安全教训?
Computer Fraud and Security Pub Date : 2022-08-01 DOI: 10.12968/s1361-3723(22)70587-8
S. Furnell
{"title":"Passwords: The cyber security lesson that was never learned?","authors":"S. Furnell","doi":"10.12968/s1361-3723(22)70587-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70587-8","url":null,"abstract":"Throughout the years, passwords have enjoyed the curious distinction of being both the most maligned and the most widely used aspect of cyber security. We know their weaknesses and people tend to use them badly, yet they continue to be deployed in ways that have allowed poor practices to continue. As a result, the same problems have persisted and we have appeared reluctant to learn the lessons that would improve the situation.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81945805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why data belongs at the heart of the organisation 为什么数据是组织的核心
Computer Fraud and Security Pub Date : 2022-07-01 DOI: 10.12968/s1361-3723(22)70582-9
R. Pathak
{"title":"Why data belongs at the heart of the organisation","authors":"R. Pathak","doi":"10.12968/s1361-3723(22)70582-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70582-9","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"151 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74496375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strategies for counteracting social engineering attacks 对抗社会工程攻击的策略
Computer Fraud and Security Pub Date : 2022-07-01 DOI: 10.12968/s1361-3723(22)70583-0
R. Fatima, Affan Yasin, Lin Liu, Wang Jianmin
{"title":"Strategies for counteracting social engineering attacks","authors":"R. Fatima, Affan Yasin, Lin Liu, Wang Jianmin","doi":"10.12968/s1361-3723(22)70583-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70583-0","url":null,"abstract":"As the result of a five-year project investigating social engineering attacks, researchers at Tsinghua University, China have identified a number of strategies that organisations can use to protect themselves. However, they warn that there is no single strategy that works for all forms of attack. And when choosing the right methods it's essential to consider the context, the environment and the available facilities.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90509184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Zscaler: 2022 ThreatLabz State of Ransomware Report Zscaler: 2022年威胁实验室勒索软件现状报告
Computer Fraud and Security Pub Date : 2022-07-01 DOI: 10.12968/s1361-3723(22)70581-7
{"title":"Zscaler: 2022 ThreatLabz State of Ransomware Report","authors":"","doi":"10.12968/s1361-3723(22)70581-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70581-7","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80493817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyber security challenges in self-driving cars 自动驾驶汽车面临的网络安全挑战
Computer Fraud and Security Pub Date : 2022-07-01 DOI: 10.12968/s1361-3723(22)70580-5
A. Mahlous
{"title":"Cyber security challenges in self-driving cars","authors":"A. Mahlous","doi":"10.12968/s1361-3723(22)70580-5","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70580-5","url":null,"abstract":"Self-driving cars, which guide themselves and perform operations by sensing their environment without human intervention, rely on sensors, actuators, complex algorithms, machine-learning systems and powerful processors to execute software. Their benefits include reducing accidents – including those caused by human errors such as drink-driving or using mobile phones, both of which are major causes of road carnage. A major drawback is that these vehicles are vulnerable to hacking because they are connected to the Internet. Manufacturers have developed an array of security mechanisms to shield these automobiles from unauthorised access, yet hackers continue to develop methods of bypassing their security layers.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82040635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HEAT-wave – defining a new era of cyberthreats 热浪——定义了网络威胁的新时代
Computer Fraud and Security Pub Date : 2022-06-01 DOI: 10.12968/s1361-3723(22)70576-3
Jonathan Lee
{"title":"HEAT-wave – defining a new era of cyberthreats","authors":"Jonathan Lee","doi":"10.12968/s1361-3723(22)70576-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70576-3","url":null,"abstract":"The acceleration of digital transformation initiatives that have catapulted users, data and business-critical applications to the cloud offers huge opportunities for businesses, but even more promise for threat actors. One of the biggest problems today is the legacy approach to security that many organisations take to protect networks from a strategic and technological standpoint: one that's cemented in ‘detect and respond’.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"63 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90428392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verizon: Data Breach Investigations Report Verizon:数据泄露调查报告
Computer Fraud and Security Pub Date : 2022-06-01 DOI: 10.12968/s1361-3723(22)70578-7
Steve Mansfield-Devine
{"title":"Verizon: Data Breach Investigations Report","authors":"Steve Mansfield-Devine","doi":"10.12968/s1361-3723(22)70578-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70578-7","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"72 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90283230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Ensuring cyber resilience in a digital world 确保数字世界中的网络弹性
Computer Fraud and Security Pub Date : 2022-06-01 DOI: 10.12968/s1361-3723(22)70577-5
D. Mattoon
{"title":"Ensuring cyber resilience in a digital world","authors":"D. Mattoon","doi":"10.12968/s1361-3723(22)70577-5","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70577-5","url":null,"abstract":"While there are advantages to having connected devices such as lighting systems, doorbells and refrigerators, they also open the door to cyber attacks and the consequences that come with them. It is crucial that the ongoing integrity and safety of these devices are ensured, with cyber resilience playing a key role in mitigating the risk of potential attacks.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80839450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can PCI DSS 4.0 reverse the decline in compliance? PCI DSS 4.0能否扭转依从性下降的趋势?
Computer Fraud and Security Pub Date : 2022-06-01 DOI: 10.12968/s1361-3723(22)70579-9
Phil Robinson
{"title":"Can PCI DSS 4.0 reverse the decline in compliance?","authors":"Phil Robinson","doi":"10.12968/s1361-3723(22)70579-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70579-9","url":null,"abstract":"The Payment Card Industry Security Standards Council (PCI SSC) finally released the long-awaited version 4.0 of the PCI Data Security Standard (PCI DSS) at the end of March after three long years of consultation. It's been described as the most substantial update to the standard for 17 years and the Council received unprecedented levels of feedback, with more than 6,000 items from over 200 members of the global payments industry. But what are its effects likely to be?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83504063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sophos: The State of Ransomware 2022 Sophos:勒索软件的状态2022
Computer Fraud and Security Pub Date : 2022-05-01 DOI: 10.12968/s1361-3723(22)70573-8
Steve Mansfield-Devine
{"title":"Sophos: The State of Ransomware 2022","authors":"Steve Mansfield-Devine","doi":"10.12968/s1361-3723(22)70573-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70573-8","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73568730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信