{"title":"构建成功的软件安全计划","authors":"Jacob Ewers","doi":"10.12968/s1361-3723(22)70013-9","DOIUrl":null,"url":null,"abstract":"Software has become an indispensable component of our everyday lives, enabling the technologies we use to be smarter and more efficient than ever before. From automating food packaging and regulating electrical grids to facilitating online banking and allowing us to connect with loved ones, software spans across all industries, helping us solve challenges both big and small. However, this comes at a price – an ever-growing attack surface.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"28 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Building successful software security initiatives\",\"authors\":\"Jacob Ewers\",\"doi\":\"10.12968/s1361-3723(22)70013-9\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Software has become an indispensable component of our everyday lives, enabling the technologies we use to be smarter and more efficient than ever before. From automating food packaging and regulating electrical grids to facilitating online banking and allowing us to connect with loved ones, software spans across all industries, helping us solve challenges both big and small. However, this comes at a price – an ever-growing attack surface.\",\"PeriodicalId\":35636,\"journal\":{\"name\":\"Computer Fraud and Security\",\"volume\":\"28 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Fraud and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12968/s1361-3723(22)70013-9\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"Social Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Fraud and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1361-3723(22)70013-9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Social Sciences","Score":null,"Total":0}
Software has become an indispensable component of our everyday lives, enabling the technologies we use to be smarter and more efficient than ever before. From automating food packaging and regulating electrical grids to facilitating online banking and allowing us to connect with loved ones, software spans across all industries, helping us solve challenges both big and small. However, this comes at a price – an ever-growing attack surface.
期刊介绍:
Computer Fraud & Security has grown with the fast-moving information technology industry and has earned a reputation for editorial excellence with IT security practitioners around the world. Every month Computer Fraud & Security enables you to see the threats to your IT systems before they become a problem. It focuses on providing practical, usable information to effectively manage and control computer and information security within commercial organizations.