首页 > 最新文献

Infosecurity最新文献

英文 中文
Phishing for Chips: Why the Online Gambling Industry is Odds-On to Beat Cybercrime 为筹码而钓鱼:为什么在线赌博业很有可能打败网络犯罪
Pub Date : 2011-03-01 DOI: 10.1016/S1754-4548(11)70024-9
Davey Winder

While online gamers might not consider information security a priority, online gambling operators are very much aware that their sites are great big targets for cybercriminals. Davey Winder asks what online gaming sites are doing to secure themselves, and their customers, against a rising tide of cybercrime?

虽然网络游戏玩家可能不会把信息安全放在首位,但在线赌博运营商非常清楚,他们的网站是网络罪犯的大目标。戴维·温德问道,在线游戏网站正在采取什么措施来保护自己和他们的客户,以抵御不断上升的网络犯罪浪潮?
{"title":"Phishing for Chips: Why the Online Gambling Industry is Odds-On to Beat Cybercrime","authors":"Davey Winder","doi":"10.1016/S1754-4548(11)70024-9","DOIUrl":"10.1016/S1754-4548(11)70024-9","url":null,"abstract":"<div><p>While online gamers might not consider information security a priority, online gambling operators are very much aware that their sites are great big targets for cybercriminals<span>. Davey Winder asks what online gaming sites are doing to secure themselves, and their customers, against a rising tide of cybercrime?</span></p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Pages 32-34"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70024-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83743020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Night Dragon Will not Be Defeated $44.99 at a Time 夜龙不会被打败一次44.99美元
Pub Date : 2011-03-01 DOI: 10.1016/S1754-4548(11)70028-6
Marc Maiffret
{"title":"Night Dragon Will not Be Defeated $44.99 at a Time","authors":"Marc Maiffret","doi":"10.1016/S1754-4548(11)70028-6","DOIUrl":"10.1016/S1754-4548(11)70028-6","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Page 45"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70028-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89769845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diary 日记
Pub Date : 2011-03-01 DOI: 10.1016/S1754-4548(11)70029-8
{"title":"Diary","authors":"","doi":"10.1016/S1754-4548(11)70029-8","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70029-8","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Page 47"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70029-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136532709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
People Are People 人就是人
Pub Date : 2011-03-01 DOI: 10.1016/S1754-4548(11)70017-1
Eleanor Dallaway (Editor)

Over the past few months, I've probably talked to around fifty information security professionals. In 90% of cases, the topic of discussion was technology. The exceptions to the rule – and thus my most memorable discussions – included my time spent with John Colley, (ISC)2, and Martin Smith, The Security Company.

在过去的几个月里,我可能与大约50位信息安全专业人士交谈过。在90%的情况下,讨论的主题是技术。这条规则的例外——也是我最难忘的讨论——包括我与John Colley (ISC)2和Martin Smith (The Security Company)的讨论。
{"title":"People Are People","authors":"Eleanor Dallaway (Editor)","doi":"10.1016/S1754-4548(11)70017-1","DOIUrl":"10.1016/S1754-4548(11)70017-1","url":null,"abstract":"<div><p>Over the past few months, I've probably talked to around fifty information security professionals. In 90% of cases, the topic of discussion was technology. The exceptions to the rule – and thus my most memorable discussions – included my time spent with John Colley, (ISC)<sup>2</sup>, and Martin Smith, The Security Company.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Page 5"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70017-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80645593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cybercrime Knows No Borders 网络犯罪不分国界
Pub Date : 2011-03-01 DOI: 10.1016/S1754-4548(11)70021-3
Lauren Moraski

Prosecuting cybercrime is no easy task. Even with today's forensic capabilities, legal inadequacies in various jurisdictions, not to mention uneven enforcement, make stemming the tide a rather daunting task. Lauren Moraski reports on the complications

起诉网络犯罪并非易事。即使有了今天的法医能力,各个司法管辖区的法律缺陷,更不用说执法不平衡,使得遏制这一趋势成为一项相当艰巨的任务。劳伦·莫拉斯基报道并发症
{"title":"Cybercrime Knows No Borders","authors":"Lauren Moraski","doi":"10.1016/S1754-4548(11)70021-3","DOIUrl":"10.1016/S1754-4548(11)70021-3","url":null,"abstract":"<div><p>Prosecuting cybercrime is no easy task. Even with today's forensic capabilities, legal inadequacies in various jurisdictions, not to mention uneven enforcement, make stemming the tide a rather daunting task. Lauren Moraski reports on the complications</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Pages 20-23"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70021-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81084403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
John Colley 约翰·考利
Pub Date : 2011-03-01 DOI: 10.1016/S1754-4548(11)70019-5
Eleanor Dallaway

You'd be hard pressed to find anyone in the UK infosec industry who doesn't know of John Colley. He is to infosec what Simon Cowell is to the music industry – a true figurehead (albeit, less scary). He doesn't attribute his high profile to his impressive CV though – instead, as Eleanor Dallaway finds out, he believes it to be the result of his networking with helpful peers over the years

在英国信息安全行业,你很难找到一个不知道约翰·科利的人。他对信息安全的重要性就像西蒙·考威尔(Simon Cowell)对音乐界的重要性一样——一个真正的有名无实的领袖(尽管没那么可怕)。不过,他并不把自己的高知名度归功于他令人印象深刻的简历——相反,正如埃莉诺•达拉维(Eleanor Dallaway)发现的那样,他认为这是他多年来与乐于助人的同行建立联系的结果
{"title":"John Colley","authors":"Eleanor Dallaway","doi":"10.1016/S1754-4548(11)70019-5","DOIUrl":"10.1016/S1754-4548(11)70019-5","url":null,"abstract":"<div><p>You'd be hard pressed to find anyone in the UK infosec industry who doesn't know of John Colley. He is to infosec what Simon Cowell is to the music industry – a true figurehead (albeit, less scary). He doesn't attribute his high profile to his impressive CV though – instead, as Eleanor Dallaway finds out, he believes it to be the result of his networking with helpful peers over the years</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 2","pages":"Pages 10-13"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70019-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90522560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WikiLeaks ‘Cablegate’ Dominates Year-End Headlines 维基解密“电文”占据了年终头条
Pub Date : 2011-01-01 DOI: 10.1016/S1754-4548(11)70002-X
Drew Amorosi

Drew Amorosi recounts the events surrounding WikiLeaks' publication of thousands of confidential US diplomatic cables that recently garnered so much international attention, and takes a look at the political fallout.

德鲁·阿莫罗西讲述了围绕维基解密公布数千份美国机密外交电报的事件,这些事件最近引起了国际社会的广泛关注,并探讨了其政治后果。
{"title":"WikiLeaks ‘Cablegate’ Dominates Year-End Headlines","authors":"Drew Amorosi","doi":"10.1016/S1754-4548(11)70002-X","DOIUrl":"10.1016/S1754-4548(11)70002-X","url":null,"abstract":"<div><p><strong>Drew Amorosi</strong> recounts the events surrounding WikiLeaks' publication of thousands of confidential US diplomatic cables that recently garnered so much international attention, and takes a look at the political fallout.</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Pages 6-9"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70002-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88059860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Dirty Secrets of Green IT 绿色IT的肮脏秘密
Pub Date : 2011-01-01 DOI: 10.1016/S1754-4548(11)70007-9
Wendy M. Grossman

The recent push to save the planet from environmental catastrophe in some quarters has dovetailed nicely with organizations' need to pare down budgets – making for some nice PR. But, as Wendy M. Grossman demonstrates, hiding behind some ‘green’ initiatives are increased security risks

最近,在一些地区,拯救地球免受环境灾难的努力与组织削减预算的需要相吻合,这使得一些公关活动变得很好。但是,正如温迪·m·格罗斯曼所展示的那样,隐藏在一些“绿色”倡议背后的是增加的安全风险
{"title":"The Dirty Secrets of Green IT","authors":"Wendy M. Grossman","doi":"10.1016/S1754-4548(11)70007-9","DOIUrl":"10.1016/S1754-4548(11)70007-9","url":null,"abstract":"<div><p>The recent push to save the planet from environmental catastrophe in some quarters has dovetailed nicely with organizations' need to pare down budgets – making for some nice PR. But, as <strong>Wendy M. Grossman</strong> demonstrates, hiding behind some ‘green’ initiatives are increased security risks</p></div>","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Pages 28-30"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70007-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"98102074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Slack Space 松弛的空间
Pub Date : 2011-01-01 DOI: 10.1016/S1754-4548(11)70016-X
{"title":"Slack Space","authors":"","doi":"10.1016/S1754-4548(11)70016-X","DOIUrl":"https://doi.org/10.1016/S1754-4548(11)70016-X","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Page 48"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70016-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137083473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Brand New Old Classic 一个全新的老经典
Pub Date : 2011-01-01 DOI: 10.1016/S1754-4548(11)70014-6
Raj Samani
{"title":"A Brand New Old Classic","authors":"Raj Samani","doi":"10.1016/S1754-4548(11)70014-6","DOIUrl":"10.1016/S1754-4548(11)70014-6","url":null,"abstract":"","PeriodicalId":100672,"journal":{"name":"Infosecurity","volume":"8 1","pages":"Page 46"},"PeriodicalIF":0.0,"publicationDate":"2011-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1754-4548(11)70014-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90612831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Infosecurity
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1