Computer Fraud & Security最新文献

筛选
英文 中文
Cloud security: sharing is caring 云安全:分享就是关爱
Computer Fraud & Security Pub Date : 2024-03-01 DOI: 10.12968/s1361-3723(24)70012-8
Martin Walsham
{"title":"Cloud security: sharing is caring","authors":"Martin Walsham","doi":"10.12968/s1361-3723(24)70012-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70012-8","url":null,"abstract":"When it comes to the security of data in the cloud, everyone has a part to play. Cloud service providers can only do so much, and it is the responsibility of the data owners to secure the parts that the service providers can't reach. This has led to the development of the shared responsibility model (SRM).","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140401672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The road to success when implementing AI 实施人工智能的成功之路
Computer Fraud & Security Pub Date : 2024-03-01 DOI: 10.12968/s1361-3723(24)70011-6
Marc Peiser
{"title":"The road to success when implementing AI","authors":"Marc Peiser","doi":"10.12968/s1361-3723(24)70011-6","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70011-6","url":null,"abstract":"Everyone's talking about artificial intelligence and many organisations are adopting it in one form or another in the hope of reaping business advantages, finding new opportunities or just out of a fear of missing out. Yet how confident are these organisations that their AI efforts will result in the benefits they seek? And is there a smarter way to go about this?","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"117 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140406848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure decentralised finance framework 安全的分散融资框架
Computer Fraud & Security Pub Date : 2024-03-01 DOI: 10.12968/s1361-3723(24)70010-4
Kavita Sahu, Rajeev Kumar
{"title":"A secure decentralised finance framework","authors":"Kavita Sahu, Rajeev Kumar","doi":"10.12968/s1361-3723(24)70010-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70010-4","url":null,"abstract":"The Secure Decentralised Finance Framework (SDFf) presented in this research addresses the burgeoning security challenges within the realm of decentralised finance (DeFi). As DeFi continues to redefine traditional financial paradigms, it concurrently introduces vulnerabilities that demand urgent attention. This framework offers a comprehensive and integrated approach to fortify the foundations of decentralised financial ecosystems. Focused on key components such as smart contract security, decentralised identity, oracle integrity, liquidity pool protection, governance mechanisms and regulatory compliance, the framework aims to establish a resilient architecture capable of withstanding evolving threats. Through theoretical exploration and case studies, this research article provides a valuable resource for developers, researchers and industry stakeholders navigating the dynamic landscape of secure and sustainable DeFi.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"43 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140407566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why the c-suite should care about anti-money laundering 企业高层为何要关注反洗钱问题
Computer Fraud & Security Pub Date : 2024-03-01 DOI: 10.12968/s1361-3723(24)70008-6
Bion Behdin
{"title":"Why the c-suite should care about anti-money laundering","authors":"Bion Behdin","doi":"10.12968/s1361-3723(24)70008-6","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70008-6","url":null,"abstract":"Complying with anti-money laundering (AML) regulations isn't easy, and too often it slips down the compliance priority list. But it's important that organisations develop a strong AML culture, and this needs to start with guidance from the top.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"91 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140406935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Navigating the privacy landscape: a data-driven perspective 驾驭隐私环境:数据驱动的视角
Computer Fraud & Security Pub Date : 2024-02-01 DOI: 10.12968/s1361-3723(24)70006-2
Chris Dimitriadis
{"title":"Navigating the privacy landscape: a data-driven perspective","authors":"Chris Dimitriadis","doi":"10.12968/s1361-3723(24)70006-2","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70006-2","url":null,"abstract":"","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"293 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140468718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transforming the workforce from cyber risk to asset 将员工队伍从网络风险转变为资产
Computer Fraud & Security Pub Date : 2024-02-01 DOI: 10.12968/s1361-3723(24)70005-0
James Morgan
{"title":"Transforming the workforce from cyber risk to asset","authors":"James Morgan","doi":"10.12968/s1361-3723(24)70005-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70005-0","url":null,"abstract":"Email is often the first point of contact between an attacker and your organisation. And this has led to firms viewing their own people as the weak point in their cyber defences. At the same time, too few organisations are investing in the training needed to improve email practices and basic cyber hygiene. With the right approach, you can turn your people into a major security asset.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"346 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140466247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing military computing with the blockchain 利用区块链确保军事计算安全
Computer Fraud & Security Pub Date : 2024-02-01 DOI: 10.12968/s1361-3723(24)70007-4
Rajeev Kumar, Raees Ahmad Khan
{"title":"Securing military computing with the blockchain","authors":"Rajeev Kumar, Raees Ahmad Khan","doi":"10.12968/s1361-3723(24)70007-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70007-4","url":null,"abstract":"In an era defined by technological advancements and digital interconnectivity, securing military computing infrastructure is of paramount importance. The integration of blockchain technology has emerged as a potential solution to mitigate evolving cyberthreats, offering a decentralised and tamper-resistant framework. This article provides a comprehensive examination of blockchain’s capabilities, challenges and implications for defence strategies. Through a synthesis of relevant literature and case studies, it elucidates blockchain’s key principles, potential advantages in military settings, and its impact on data security and accountability. As militaries worldwide seek to protect sensitive information and critical systems, the integration of blockchain offers a promising avenue for bolstering security, contributing to the development of more robust defence systems in the digital age.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"231 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140469796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measuring maturity: getting better at assessing cyber readiness 衡量成熟度:更好地评估网络准备情况
Computer Fraud & Security Pub Date : 2024-01-01 DOI: 10.12968/s1361-3723(24)70003-7
Phil Robinson
{"title":"Measuring maturity: getting better at assessing cyber readiness","authors":"Phil Robinson","doi":"10.12968/s1361-3723(24)70003-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70003-7","url":null,"abstract":"Judging whether your organisation is prepared to withstand a cyber attack or a breach is not easy. Does your level of readiness match the threats you face? Neither one is easy to measure, but that's something you have to do if you want to be confident about your cyber maturity.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"21 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140522872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sustainable crypto-currency blockchain defence against security attacks 可持续加密货币区块链防御安全攻击
Computer Fraud & Security Pub Date : 2024-01-01 DOI: 10.12968/s1361-3723(24)70002-5
P. Maoneke, Stephen Flowerday
{"title":"Sustainable crypto-currency blockchain defence against security attacks","authors":"P. Maoneke, Stephen Flowerday","doi":"10.12968/s1361-3723(24)70002-5","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70002-5","url":null,"abstract":"In spite of increasing attacks against crypto-currency platforms, involving staggeringly large amounts of money, there has been surprisingly little research into how the blockchain infrastructure at the core of these platforms could be enhanced to improve security. This study examines security weaknesses in public blockchains in an attempt to gain a clearer view of the vulnerabilities.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"31 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140522158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Has AI finally become a serious threat? 人工智能终于成为严重威胁了吗?
Computer Fraud & Security Pub Date : 2024-01-01 DOI: 10.12968/s1361-3723(24)70001-3
Steve Mansfield-Devine
{"title":"Has AI finally become a serious threat?","authors":"Steve Mansfield-Devine","doi":"10.12968/s1361-3723(24)70001-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70001-3","url":null,"abstract":"Artificial intelligence struggled to be taken seriously for decades. Now, with the advent of large language models (LLMs) and machine learning (ML), AI's time has come. But like so many new technologies, it is a double-edged sword, capable of being misused for malicious purposes. Could the next 12 months be the year of the AI threat?","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140519375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信