Computer Fraud & Security最新文献

筛选
英文 中文
Securing data on the move 移动中保护数据安全
Computer Fraud & Security Pub Date : 2024-06-01 DOI: 10.12968/s1361-3723(24)70025-6
Rick Vanover
{"title":"Securing data on the move","authors":"Rick Vanover","doi":"10.12968/s1361-3723(24)70025-6","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70025-6","url":null,"abstract":"Organisations are not only moving much of their data to the cloud, many are adopting hybrid or multi-cloud models. This can result in a lot of data being on the move at any given time. But enabling that kind of data portability is not simple, especially when it comes to making sure it’s secure.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"10 17","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141397831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rethinking how you safeguard data 重新思考如何保护数据
Computer Fraud & Security Pub Date : 2024-06-01 DOI: 10.12968/s1361-3723(24)70022-0
Mark Grindey
{"title":"Rethinking how you safeguard data","authors":"Mark Grindey","doi":"10.12968/s1361-3723(24)70022-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70022-0","url":null,"abstract":"The breach of 23andMe has highlighted the vulnerability of a cloud-only approach to data storage. One way that organisations can mitigate similar risks is by implementing on-premises and hybrid cloud solutions. These technologies can play a vital role in safeguarding organisational data, so long as you approach them in the right way.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"80 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141402684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traditional fraud engines need to widen their view 传统欺诈引擎需要拓宽视野
Computer Fraud & Security Pub Date : 2024-06-01 DOI: 10.12968/s1361-3723(24)70024-4
Danny Kadyshevitch
{"title":"Traditional fraud engines need to widen their view","authors":"Danny Kadyshevitch","doi":"10.12968/s1361-3723(24)70024-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70024-4","url":null,"abstract":"Most fraud detection systems are based on the frauds of the past. As criminals develop new and innovative ways of committing fraud, based on emerging technologies such as AI, those systems are lagging dangerously behind.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"78 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141412044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The AI vs AI showdown 人工智能与人工智能的对决
Computer Fraud & Security Pub Date : 2024-06-01 DOI: 10.12968/s1361-3723(24)70023-2
Simon Horswell
{"title":"The AI vs AI showdown","authors":"Simon Horswell","doi":"10.12968/s1361-3723(24)70023-2","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70023-2","url":null,"abstract":"As we struggle to understand the real impact that AI is going to have on society, business and individual lives, we also need to work to put in place safeguards to shield us from malicious use of the technology. And while policies, laws and regulations all have their part to play, AI itself could be the answer to keeping AI in check.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"24 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141407574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to harness AI securely in your business 如何在企业中安全利用人工智能
Computer Fraud & Security Pub Date : 2024-06-01 DOI: 10.12968/s1361-3723(24)70021-9
Suid Adeyanju
{"title":"How to harness AI securely in your business","authors":"Suid Adeyanju","doi":"10.12968/s1361-3723(24)70021-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70021-9","url":null,"abstract":"In the race to exploit AI solutions for competitive gain, too many organisations are ignoring the inherent security issues. In fact, a significant proportion are unaware that there are security issues. This is leading to high-risk situations about which firms remain dangerously ignorant. However, there are ways to reap the benefits of AI without exposing yourself to the risks.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"21 83","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141389701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing data retention with AI-assisted data management 利用人工智能辅助数据管理提高数据保留率
Computer Fraud & Security Pub Date : 2024-05-01 DOI: 10.12968/s1361-3723(24)70020-7
Jon Fielding
{"title":"Enhancing data retention with AI-assisted data management","authors":"Jon Fielding","doi":"10.12968/s1361-3723(24)70020-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70020-7","url":null,"abstract":"As data volumes grow exponentially, it's becoming an increasingly arduous task deciding what to keep and what to delete. Yet this is an essential task – not least for the sake of regulatory compliance. This is one more area where AI can significantly lighten the load.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"2006 15","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141027257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generative AI has democratised fraud and cybercrime 生成式人工智能使欺诈和网络犯罪民主化
Computer Fraud & Security Pub Date : 2024-05-01 DOI: 10.12968/s1361-3723(24)70018-9
Danny Kadyshevitch
{"title":"Generative AI has democratised fraud and cybercrime","authors":"Danny Kadyshevitch","doi":"10.12968/s1361-3723(24)70018-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70018-9","url":null,"abstract":"Artificial intelligence has no intrinsic ethical stance. Everything depends on the uses to which it is put. This is leading to an arms race between threat actors, using generative AI and large language models (LLMs) to hone the effectiveness of phishing and other forms of attack, and security professionals looking to conscript AI into the effort to identify and interdict those attackers. What's certain is that no-one can ignore generative AI and LLMs, and it's important to understand both the threat and the potential for enhancing security.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"38 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141035654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The insider threat ‘zoo’ 内部威胁 "动物园
Computer Fraud & Security Pub Date : 2024-05-01 DOI: 10.12968/s1361-3723(24)70019-0
Karen Renaud, Merrill Warkentin
{"title":"The insider threat ‘zoo’","authors":"Karen Renaud, Merrill Warkentin","doi":"10.12968/s1361-3723(24)70019-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70019-0","url":null,"abstract":"The ‘insider threat’ is often discussed as though it is a single phenomenon. In fact, there are several species of threat and it's important to understand the differences between them. This article suggests a new taxonomy for insider threats and how to deal with them.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"54 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141043151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The recruitment wall in cyber security 网络安全领域的招聘墙
Computer Fraud & Security Pub Date : 2024-05-01 DOI: 10.12968/s1361-3723(24)70017-7
Jamal Elmellas
{"title":"The recruitment wall in cyber security","authors":"Jamal Elmellas","doi":"10.12968/s1361-3723(24)70017-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70017-7","url":null,"abstract":"Organisations have been complaining for years about the cyber security skills gap, and the problem seems to be getting worse. However, many of the issues stem not from a lack of willing people but arbitrary barriers being placed in the way of those who would like to enter the field. We need more entry-level routes into cyber security, greater diversity and better support for training programmes.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"32 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141049445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strengthening digital safety for small businesses 加强小企业的数字安全
Computer Fraud & Security Pub Date : 2024-03-01 DOI: 10.12968/s1361-3723(24)70009-8
Jen Brown
{"title":"Strengthening digital safety for small businesses","authors":"Jen Brown","doi":"10.12968/s1361-3723(24)70009-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70009-8","url":null,"abstract":"Breaches at large organisations may grab the headlines, but attacks against small and medium-size businesses (SMBs) can be more frequent and more damaging. Although smaller firms may not have the budget to eliminate the threat entirely, this guide shows how effective use of the resources you have can significantly reduce the risks.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"49 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140398499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信