Computer Fraud and Security最新文献

筛选
英文 中文
Encrypted DNS: The good, the bad and the moot 加密DNS:好的,坏的和没有意义的
Computer Fraud and Security Pub Date : 2022-05-01 DOI: 10.12968/s1361-3723(22)70572-6
G. Kambourakis, Georgios Karopoulos
{"title":"Encrypted DNS: The good, the bad and the moot","authors":"G. Kambourakis, Georgios Karopoulos","doi":"10.12968/s1361-3723(22)70572-6","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70572-6","url":null,"abstract":"Every connection to an Internet service requires a Domain Name System (DNS) lookup. Nevertheless, similar to other protocols used since the early days of the Internet, DNS was not designed with trust and security in mind. From a bird's eye view, the DNS threat model boils down to two types of attackers: off-path ones who can transmit packets but cannot observe the traffic, and on-path who sit either between the client and the recursive resolver, or between the recursive resolver and the DNS servers, and can read or modify packets.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"48 16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83411268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
How SMEs can prevent third-party vendor data breaches 中小企业如何防止第三方供应商数据泄露
Computer Fraud and Security Pub Date : 2022-05-01 DOI: 10.12968/s1361-3723(22)70574-x
Oliver Pinson-Roxburgh
{"title":"How SMEs can prevent third-party vendor data breaches","authors":"Oliver Pinson-Roxburgh","doi":"10.12968/s1361-3723(22)70574-x","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70574-x","url":null,"abstract":"Small businesses are born from passion, personality and a will to grace the world with unique products or services. But in an increasingly digital world, they're built and sustained on practicalities such as having a functional website, providing punctual customer support or efficiently managing finances. Technical skills – and especially security – are unlikely to be one of your core competencies. But if you outsource it, are you really in control?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72521399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud – buzzword or business plan? 云——流行语还是商业计划?
Computer Fraud and Security Pub Date : 2022-05-01 DOI: 10.12968/s1361-3723(22)70575-1
P. Wragg
{"title":"Cloud – buzzword or business plan?","authors":"P. Wragg","doi":"10.12968/s1361-3723(22)70575-1","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70575-1","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"71 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78139519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The age of holistic consolidation and automation of cyber security 网络安全的整体整合和自动化时代
Computer Fraud and Security Pub Date : 2022-04-01 DOI: 10.12968/s1361-3723(22)70571-4
Tim Wallen
{"title":"The age of holistic consolidation and automation of cyber security","authors":"Tim Wallen","doi":"10.12968/s1361-3723(22)70571-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70571-4","url":null,"abstract":"Solution saturation is plaguing the cyber security market. Technology has driven the security strategy for security teams for far too long, which only compounds the problem, leaving them with too many tools, and with cross-functionality and gaps remaining in their security posture. Organisations need to shift the way they think about their cyber security challenges and how they can overcome them.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"2012 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86427219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the API economy 确保API经济
Computer Fraud and Security Pub Date : 2022-04-01 DOI: 10.12968/s1361-3723(22)70570-2
T. Spencer
{"title":"Securing the API economy","authors":"T. Spencer","doi":"10.12968/s1361-3723(22)70570-2","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70570-2","url":null,"abstract":"Application programming interfaces (APIs) are an example of technological advances that continue to play a vital role in our digital experience. But while APIs present ample opportunity for growth, managing user data creates an increased responsibility to ensure the safety of API-enabled transactions, and data breaches aren't made easier by the presence of APIs in an app's software architecture.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82146540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How government bodies can lead the field on data management and privacy 政府机构如何在数据管理和隐私方面发挥领导作用
Computer Fraud and Security Pub Date : 2022-04-01 DOI: 10.12968/s1361-3723(22)70569-6
J. Fielding
{"title":"How government bodies can lead the field on data management and privacy","authors":"J. Fielding","doi":"10.12968/s1361-3723(22)70569-6","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70569-6","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"48 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73290082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RATs in the cloud: gaining access to container environments 云中的rat:获得对容器环境的访问权
Computer Fraud and Security Pub Date : 2022-04-01 DOI: 10.12968/s1361-3723(22)70567-2
Assaf Morag
{"title":"RATs in the cloud: gaining access to container environments","authors":"Assaf Morag","doi":"10.12968/s1361-3723(22)70567-2","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70567-2","url":null,"abstract":"Misconfigured UI tools can allow access and control over cloud-native environments. This article looks at the techniques that threat actors use to exploit UI tools for their benefit.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"122 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74463506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Security Breaches Survey 2022 网络安全漏洞调查2022
Computer Fraud and Security Pub Date : 2022-04-01 DOI: 10.12968/s1361-3723(22)70568-4
Steve Mansfield-Devine
{"title":"Cyber Security Breaches Survey 2022","authors":"Steve Mansfield-Devine","doi":"10.12968/s1361-3723(22)70568-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70568-4","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"84 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83825751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
The who, what, why and when of data protection impact assessments 谁、什么、为什么和何时进行数据保护影响评估
Computer Fraud and Security Pub Date : 2022-04-01 DOI: 10.12968/s1361-3723(22)70566-0
Nigel Jones
{"title":"The who, what, why and when of data protection impact assessments","authors":"Nigel Jones","doi":"10.12968/s1361-3723(22)70566-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70566-0","url":null,"abstract":"Despite their importance, misunderstandings about Data Protection Impact Assessments (DPIAs) are a common stumbling block for many businesses. So what do you need to know about them?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74178379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying the changing faces of international fraudsters 识别国际欺诈者不断变化的面孔
Computer Fraud and Security Pub Date : 2022-03-01 DOI: 10.12968/s1361-3723(22)70563-5
Sam Ranieri
{"title":"Identifying the changing faces of international fraudsters","authors":"Sam Ranieri","doi":"10.12968/s1361-3723(22)70563-5","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70563-5","url":null,"abstract":"Businesses are exploring new frontiers in e-commerce, with lucrative growth opportunities opening all over the globe. The acceleration of online buying, fuelled by the pandemic, means that retailers are scrambling to serve a rapidly expanding global customer base. It's clear that consumers everywhere have quickly adapted to e-commerce but accompanying this huge evolution in consumer demand are emerging fraud threats, designed to exploit vulnerabilities in the digital ecosystem.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"12 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89362995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信