{"title":"Cloud security: sharing is caring","authors":"Martin Walsham","doi":"10.12968/s1361-3723(24)70012-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70012-8","url":null,"abstract":"When it comes to the security of data in the cloud, everyone has a part to play. Cloud service providers can only do so much, and it is the responsibility of the data owners to secure the parts that the service providers can't reach. This has led to the development of the shared responsibility model (SRM).","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140401672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The road to success when implementing AI","authors":"Marc Peiser","doi":"10.12968/s1361-3723(24)70011-6","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70011-6","url":null,"abstract":"Everyone's talking about artificial intelligence and many organisations are adopting it in one form or another in the hope of reaping business advantages, finding new opportunities or just out of a fear of missing out. Yet how confident are these organisations that their AI efforts will result in the benefits they seek? And is there a smarter way to go about this?","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"117 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140406848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A secure decentralised finance framework","authors":"Kavita Sahu, Rajeev Kumar","doi":"10.12968/s1361-3723(24)70010-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70010-4","url":null,"abstract":"The Secure Decentralised Finance Framework (SDFf) presented in this research addresses the burgeoning security challenges within the realm of decentralised finance (DeFi). As DeFi continues to redefine traditional financial paradigms, it concurrently introduces vulnerabilities that demand urgent attention. This framework offers a comprehensive and integrated approach to fortify the foundations of decentralised financial ecosystems. Focused on key components such as smart contract security, decentralised identity, oracle integrity, liquidity pool protection, governance mechanisms and regulatory compliance, the framework aims to establish a resilient architecture capable of withstanding evolving threats. Through theoretical exploration and case studies, this research article provides a valuable resource for developers, researchers and industry stakeholders navigating the dynamic landscape of secure and sustainable DeFi.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"43 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140407566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Why the c-suite should care about anti-money laundering","authors":"Bion Behdin","doi":"10.12968/s1361-3723(24)70008-6","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70008-6","url":null,"abstract":"Complying with anti-money laundering (AML) regulations isn't easy, and too often it slips down the compliance priority list. But it's important that organisations develop a strong AML culture, and this needs to start with guidance from the top.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"91 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140406935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Navigating the privacy landscape: a data-driven perspective","authors":"Chris Dimitriadis","doi":"10.12968/s1361-3723(24)70006-2","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70006-2","url":null,"abstract":"","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"293 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140468718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transforming the workforce from cyber risk to asset","authors":"James Morgan","doi":"10.12968/s1361-3723(24)70005-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70005-0","url":null,"abstract":"Email is often the first point of contact between an attacker and your organisation. And this has led to firms viewing their own people as the weak point in their cyber defences. At the same time, too few organisations are investing in the training needed to improve email practices and basic cyber hygiene. With the right approach, you can turn your people into a major security asset.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"346 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140466247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing military computing with the blockchain","authors":"Rajeev Kumar, Raees Ahmad Khan","doi":"10.12968/s1361-3723(24)70007-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70007-4","url":null,"abstract":"In an era defined by technological advancements and digital interconnectivity, securing military computing infrastructure is of paramount importance. The integration of blockchain technology has emerged as a potential solution to mitigate evolving cyberthreats, offering a decentralised and tamper-resistant framework. This article provides a comprehensive examination of blockchain’s capabilities, challenges and implications for defence strategies. Through a synthesis of relevant literature and case studies, it elucidates blockchain’s key principles, potential advantages in military settings, and its impact on data security and accountability. As militaries worldwide seek to protect sensitive information and critical systems, the integration of blockchain offers a promising avenue for bolstering security, contributing to the development of more robust defence systems in the digital age.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"231 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140469796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring maturity: getting better at assessing cyber readiness","authors":"Phil Robinson","doi":"10.12968/s1361-3723(24)70003-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70003-7","url":null,"abstract":"Judging whether your organisation is prepared to withstand a cyber attack or a breach is not easy. Does your level of readiness match the threats you face? Neither one is easy to measure, but that's something you have to do if you want to be confident about your cyber maturity.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"21 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140522872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sustainable crypto-currency blockchain defence against security attacks","authors":"P. Maoneke, Stephen Flowerday","doi":"10.12968/s1361-3723(24)70002-5","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70002-5","url":null,"abstract":"In spite of increasing attacks against crypto-currency platforms, involving staggeringly large amounts of money, there has been surprisingly little research into how the blockchain infrastructure at the core of these platforms could be enhanced to improve security. This study examines security weaknesses in public blockchains in an attempt to gain a clearer view of the vulnerabilities.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"31 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140522158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Has AI finally become a serious threat?","authors":"Steve Mansfield-Devine","doi":"10.12968/s1361-3723(24)70001-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(24)70001-3","url":null,"abstract":"Artificial intelligence struggled to be taken seriously for decades. Now, with the advent of large language models (LLMs) and machine learning (ML), AI's time has come. But like so many new technologies, it is a double-edged sword, capable of being misused for malicious purposes. Could the next 12 months be the year of the AI threat?","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140519375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}