首页 > 最新文献

Infosecurity最新文献

英文 中文
Breaking the Online Bank 破解网上银行
Pub Date : 2011-09-01 DOI: 10.1016/S1754-4548(11)70068-7
Ted Kritsonis

As technology and online behaviors change, so too do methods to compromise a person's — or organization's — most vital assets: their financial details. Ted Kritsonis examines how cyber thieves are adapting, and what the banks are doing to stop them

随着技术和网络行为的变化,危及个人或组织最重要资产的方法也在变化:他们的财务细节。Ted Kritsonis研究了网络窃贼是如何适应的,以及银行正在做些什么来阻止他们
{"title":"Breaking the Online Bank","authors":"Ted Kritsonis","doi":"10.1016/S1754-4548(11)70068-7","DOIUrl":"10.1016/S1754-4548(11)70068-7","url":null,"abstract":"<div><p>As technology and online behaviors change, so too do methods to compromise a person's — or organization's — most vital assets: their financial details. <strong>Ted Kritsonis</strong> examines how cyber thieves are adapting, and what the banks are doing to stop them</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 5","pages":"Pages 36-39"},"PeriodicalIF":0.0,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70068-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"96806499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Vendors: Trend-Setters, or Trend Followers? 安全供应商:潮流引领者还是潮流跟随者?
Pub Date : 2011-07-01 DOI: 10.1016/S1754-4548(11)70053-5
Danny Bradbury

How far ahead of the curve – or behind it – are vendors when it comes to identifying security trends? Danny Bradbury finds out that the curve may not matter at all

厂商在识别安全趋势方面领先了多远,还是落后了多远?丹尼·布拉德伯里发现曲线可能根本不重要
{"title":"Security Vendors: Trend-Setters, or Trend Followers?","authors":"Danny Bradbury","doi":"10.1016/S1754-4548(11)70053-5","DOIUrl":"10.1016/S1754-4548(11)70053-5","url":null,"abstract":"<div><p>How far ahead of the curve – or behind it – are vendors when it comes to identifying security trends? <strong>Danny Bradbury</strong> finds out that the curve may not matter at all</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Pages 32-35"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70053-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"110913112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Truth About DLP DLP的真相
Pub Date : 2011-07-01 DOI: 10.1016/S1754-4548(11)70049-3
Stephen Prichard

Data loss prevention: the term that fills marketing managers with joy, and infosec managers with dread. Preventing a data leak may be the top priority for the IT security team, but is DLP technology mature, and cost effective enough, to be the answer? Stephen Pritchard reports

数据丢失预防:这个词让营销经理欢欣鼓舞,却让信息安全经理恐惧不已。防止数据泄露可能是IT安全团队的首要任务,但是DLP技术是否足够成熟,成本效益是否足够高?Stephen Pritchard报道
{"title":"The Truth About DLP","authors":"Stephen Prichard","doi":"10.1016/S1754-4548(11)70049-3","DOIUrl":"10.1016/S1754-4548(11)70049-3","url":null,"abstract":"<div><p><span>Data loss prevention: the term that fills marketing managers with joy, and infosec managers with dread. Preventing a data leak may be the top priority for the IT security team, but is DLP technology mature, and cost effective enough, to be the answer? </span><strong>Stephen Pritchard</strong> reports</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Pages 18-21"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70049-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88180992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AV: Life in the Old Dog? AV:《老狗的生活》?
Pub Date : 2011-07-01 DOI: 10.1016/S1754-4548(11)70050-X
Cath Everett

Once upon a time, anti-virus technology was a well-coveted standalone product. These days, it is often considered a commodity that can be adequately built into a UTM offering. Cath Everett investigates whether or not a market for standalone anti-virus technology still exists

曾几何时,反病毒技术是一种令人垂涎的独立产品。如今,它通常被认为是一种可以充分构建到UTM产品中的商品。Cath Everett调查了独立反病毒技术的市场是否仍然存在
{"title":"AV: Life in the Old Dog?","authors":"Cath Everett","doi":"10.1016/S1754-4548(11)70050-X","DOIUrl":"10.1016/S1754-4548(11)70050-X","url":null,"abstract":"<div><p>Once upon a time, anti-virus technology was a well-coveted standalone product. These days, it is often considered a commodity that can be adequately built into a UTM offering. <strong>Cath Everett</strong> investigates whether or not a market for standalone anti-virus technology still exists</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Pages 22-25"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70050-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80611469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Come Together 聚在一起
Pub Date : 2011-07-01 DOI: 10.1016/S1754-4548(11)70045-6
Eleanor Dallaway (Editor)

My last editorial was all about change. I wrote that uncertainty was the biggest certainty we have in this industry, and to (bizarrely) quote myself, “Change will happen, and it will do so because whatever preceded ‘it’ was imperfect”. In the two months since the May/June issue was published, Infosecurity magazine has been through some exciting changes of its own.

我上一篇社论是关于改变的。我写道,不确定性是我们在这个行业中最大的确定性,并且(奇怪地)引用我自己的话,“变化会发生,它会发生,因为在它之前的任何东西都是不完美的”。自5 / 6月刊出版以来的两个月里,《资讯保安》杂志也经历了一些令人兴奋的变化。
{"title":"Come Together","authors":"Eleanor Dallaway (Editor)","doi":"10.1016/S1754-4548(11)70045-6","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70045-6","url":null,"abstract":"<div><p>My last editorial was all about change. I wrote that uncertainty was the biggest certainty we have in this industry, and to (bizarrely) quote myself, “Change will happen, and it will do so because whatever preceded ‘it’ was imperfect”. In the two months since the May/June issue was published, <em>Infosecurity</em> magazine has been through some exciting changes of its own.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70045-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136459179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cashing in on Security Training 利用安全培训赚钱
Pub Date : 2011-07-01 DOI: 10.1016/S1754-4548(11)70051-1

At long last, a cybersecurity career field has emerged. The (ISC)2 US Government Advisory Board Executive Writers Bureau examines where employment opportunities lie and how much you can expect to be paid in this very important sector

网络安全职业领域终于出现了。(ISC)2美国政府顾问委员会执行作家局调查了就业机会在哪里,以及在这个非常重要的领域你可以期望得到多少报酬
{"title":"Cashing in on Security Training","authors":"","doi":"10.1016/S1754-4548(11)70051-1","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70051-1","url":null,"abstract":"<div><p>At long last, a cybersecurity career field has emerged. The <strong>(ISC)<sup>2</sup> US Government Advisory Board Executive Writers Bureau</strong> examines where employment opportunities lie and how much you can expect to be paid in this very important sector</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Pages 26-28"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70051-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136530582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The State of Smartphone Security 智能手机的安全状况
Pub Date : 2011-07-01 DOI: 10.1016/S1754-4548(11)70054-7
Davey Winder

An awful lot of lip service has been paid to smartphone security. Whereas most industry experts agree that, to date at least, smartphone security threats are mainly hype, that doesn't mean this won't change. Davey Winder investigates…

关于智能手机的安全问题,很多人只是嘴上说说而已。尽管大多数行业专家都认为,至少到目前为止,智能手机安全威胁主要是炒作,但这并不意味着这种情况不会改变。戴维·温德调查……
{"title":"The State of Smartphone Security","authors":"Davey Winder","doi":"10.1016/S1754-4548(11)70054-7","DOIUrl":"10.1016/S1754-4548(11)70054-7","url":null,"abstract":"<div><p>An awful lot of lip service has been paid to smartphone security. Whereas most industry experts agree that, to date at least, smartphone security threats are mainly hype, that doesn't mean this won't change. <strong>Davey Winder</strong> investigates…</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Pages 36-39"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70054-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77544698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Biometrics: How and Now? 生物识别技术:如何以及现在?
Pub Date : 2011-07-01 DOI: 10.1016/S1754-4548(11)70048-1
Esther Shein

Using biometric data for identity access and management can be a controversial move. Esther Shein examines the drawbacks, and looks at where and how biometrics are currently being used

使用生物识别数据进行身份访问和管理可能是一个有争议的举动。埃斯特·谢恩(Esther Shein)研究了生物识别技术的缺点,并研究了目前生物识别技术在哪里以及如何被使用
{"title":"Biometrics: How and Now?","authors":"Esther Shein","doi":"10.1016/S1754-4548(11)70048-1","DOIUrl":"10.1016/S1754-4548(11)70048-1","url":null,"abstract":"<div><p><span>Using biometric data<span> for identity access and management can be a controversial move. </span></span><strong>Esther Shein</strong><span> examines the drawbacks, and looks at where and how biometrics are currently being used</span></p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Pages 14-17"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70048-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75986832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nice Idea, Shame About the Outcome 好主意,可惜结果不好
Pub Date : 2011-07-01 DOI: 10.1016/S1754-4548(11)70056-0
Hugh H. Penri-Williams
{"title":"Nice Idea, Shame About the Outcome","authors":"Hugh H. Penri-Williams","doi":"10.1016/S1754-4548(11)70056-0","DOIUrl":"10.1016/S1754-4548(11)70056-0","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Page 45"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70056-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"99764276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rotting Apple 腐烂的苹果
Pub Date : 2011-07-01 DOI: 10.1016/S1754-4548(11)70046-8
Drew Amorosi

Vendors, analysts, and commentators alike have long predicted a surge in malware affecting Apple's products. Yet, until recently, these prognostications have failed to materialize. Drew Amorosi examines recent malware threats to Apple's OS X operating system to find out if this is an anomaly, or a sign of things to come

长期以来,供应商、分析师和评论员都预测影响苹果产品的恶意软件会激增。然而,直到最近,这些预言都未能成为现实。德鲁·阿莫罗西研究了最近苹果OS X操作系统受到的恶意软件威胁,看看这是一种异常现象,还是预示着即将发生的事情
{"title":"Rotting Apple","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70046-8","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70046-8","url":null,"abstract":"<div><p><span>Vendors, analysts, and commentators alike have long predicted a surge in malware affecting Apple's products. Yet, until recently, these prognostications have failed to materialize. </span><strong>Drew Amorosi</strong> examines recent malware threats to Apple's OS X operating system to find out if this is an anomaly, or a sign of things to come</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 4","pages":"Pages 6-9"},"PeriodicalIF":0.0,"publicationDate":"2011-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70046-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136493532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Infosecurity
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1