{"title":"Detecting message spoofing attacks on smart vehicles","authors":"Mohamad Ibrahim, Nader Sohrabi Safa","doi":"10.12968/s1361-3723(23)70054-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70054-7","url":null,"abstract":"The rapid proliferation of smart vehicles, particularly connected vehicles, has led to a rise in cyberthreats. Ensuring the security of associated equipment has become a pressing concern. This article presents an analysis of various machine learning models for detecting message spoofing attacks on smart vehicles. These types of attacks can pose a significant risk to the safety and security of smart vehicles, with dangers such as accidents, hijacking incidents and other severe consequences. The findings indicate the potential of machine learning models in detecting message spoofing attacks. And the results underscore the need for robust security measures to prevent message spoofing attacks on smart vehicles.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"28 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139190510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Procurement's vital role in mitigating cyber security risks","authors":"Conrad Snover","doi":"10.12968/s1361-3723(23)70055-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70055-9","url":null,"abstract":"Organisations are heavily dependent on their supply chains and partners. But those third parties can also be the source of serious security vulnerabilities. When it comes to selecting partners and vendors, it's time to engage the services of a chief procurement officer, working alongside the IT department, to help ensure that your organisation's safety isn't undermined by your procurement activities.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"321 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139196260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Governing cyber security in the maritime industry","authors":"Rossouw von Solms","doi":"10.12968/s1361-3723(23)70056-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70056-0","url":null,"abstract":"The maritime industry is critical for global trade and transportation. Owing to the continued increase in digitisation and connectivity, the industry faces various cyber security challenges. This paper explores the significance of governing cyber security in the maritime industry. By conducting an in-depth analysis of existing literature, industry reports, regulations, standards, etc, the paper aims to provide insights into the current state of cyber security governance in the maritime industry and makes recommendations for augmenting cyber resilience. This paper explores the significance of governing cyber security in the maritime industry.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139191314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From zero trust to total trust in financial services","authors":"Stefan Auerbach","doi":"10.12968/s1361-3723(23)70051-1","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70051-1","url":null,"abstract":"Trust is critical in the financial services industry, but it's not something that organisations in this sector can take for granted. Gaining the trust of customers and partners starts with having systems that are highly secure. And the path to that goal might lie in a policy of zero trust.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"111 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139300425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wojciech Wodo, Michal Gancarczyk, Jakub Czyszczonik
{"title":"A security analysis of SOHO embedded systems","authors":"Wojciech Wodo, Michal Gancarczyk, Jakub Czyszczonik","doi":"10.12968/s1361-3723(23)70053-5","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70053-5","url":null,"abstract":"Due to many unusual constraints imposed on their design, embedded systems carry a large set of challenges related to feature implementation and security. Many systems extant today prove the extreme difficulty of designing a secure software architecture. Nevertheless, IoT systems are crucial in many environments ranging from large-scale, tightly secured commercial deployments to relatively unprotected home networks.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139299763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Redefining identity-first security with observability","authors":"Wade Ellery","doi":"10.12968/s1361-3723(23)70052-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70052-3","url":null,"abstract":"An identity-first approach to security, based on a zero-trust model, is being widely adopted as the concept of the network perimeter disappears. But many of these projects will fail and others will not achieve the full benefits available. These challenges can be avoided if the organisation is equipped to assess and manage identity data holistically through a capability known as identity observability.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139304597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}