首页 > 最新文献

Computer Fraud and Security最新文献

英文 中文
Good cyber security governance is crucial for us all 良好的网络安全治理对我们所有人都至关重要
Q1 Social Sciences Pub Date : 2023-08-01 DOI: 10.12968/s1361-3723(23)70038-9
Corey Nachreiners
It's time we moved on from the traditional focus on technical and operational controls that IT teams need to deploy to defend against attack, and adopt a proper cyber security governance programme.
It团队需要部署技术和运营控制来防御攻击,现在是时候改变传统的关注焦点,采用适当的网络安全治理计划。
{"title":"Good cyber security governance is crucial for us all","authors":"Corey Nachreiners","doi":"10.12968/s1361-3723(23)70038-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70038-9","url":null,"abstract":"It's time we moved on from the traditional focus on technical and operational controls that IT teams need to deploy to defend against attack, and adopt a proper cyber security governance programme.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82749628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new age of cyber: transitioning from security to safety 网络新时代:从安全过渡到安全
Q1 Social Sciences Pub Date : 2023-08-01 DOI: 10.12968/s1361-3723(23)70036-5
G. Golan
As we shift further and further into the digital realm, the threats that face us are outpacing even the most aggressive digital transformation efforts. For businesses, tackling security is no longer a matter of making IT systems more robust – it is about the safety of the entire organisation.
随着我们越来越深入数字领域,我们面临的威胁甚至超过了最积极的数字转型努力。对于企业来说,解决安全问题不再是使IT系统更健壮的问题,而是关乎整个组织的安全。
{"title":"A new age of cyber: transitioning from security to safety","authors":"G. Golan","doi":"10.12968/s1361-3723(23)70036-5","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70036-5","url":null,"abstract":"As we shift further and further into the digital realm, the threats that face us are outpacing even the most aggressive digital transformation efforts. For businesses, tackling security is no longer a matter of making IT systems more robust – it is about the safety of the entire organisation.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82203476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Don't blame people – fix the system 不要责怪别人,修复系统
Q1 Social Sciences Pub Date : 2023-08-01 DOI: 10.12968/s1361-3723(23)70035-3
Christine Bejerasco
It's easy to blame people when security incidents occur. But while many types of breaches do indeed involve a human element, we should stop to ask ourselves why people acted in the ways they did, and why that was allowed to become a problem. Our systems and processes need to be designed with security embedded deeply within them so that minor lapses on the part of staff members are prevented from becoming a problem.
当安全事件发生时,人们很容易责怪别人。但是,虽然许多类型的违规确实涉及人为因素,但我们应该停下来问自己,为什么人们会以他们的方式行事,为什么允许这成为一个问题。我们的制度和程序需要在设计时深深嵌入安全措施,以防止工作人员的小失误成为问题。
{"title":"Don't blame people – fix the system","authors":"Christine Bejerasco","doi":"10.12968/s1361-3723(23)70035-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70035-3","url":null,"abstract":"It's easy to blame people when security incidents occur. But while many types of breaches do indeed involve a human element, we should stop to ask ourselves why people acted in the ways they did, and why that was allowed to become a problem. Our systems and processes need to be designed with security embedded deeply within them so that minor lapses on the part of staff members are prevented from becoming a problem.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80216925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coming to terms with DORA 和朵拉达成协议
Q1 Social Sciences Pub Date : 2023-08-01 DOI: 10.12968/s1361-3723(23)70037-7
D. Morgan
The European Union's Digital Operational Resilience Act (DORA) tackles what is currently seen as a weak element in the financial sector – third-party tech suppliers. But does it affect you? And if so, how should you respond?
欧盟的《数字运营弹性法案》(DORA)解决了目前被视为金融部门薄弱环节的第三方技术供应商。但这对你有影响吗?如果是,你该如何回应?
{"title":"Coming to terms with DORA","authors":"D. Morgan","doi":"10.12968/s1361-3723(23)70037-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70037-7","url":null,"abstract":"The European Union's Digital Operational Resilience Act (DORA) tackles what is currently seen as a weak element in the financial sector – third-party tech suppliers. But does it affect you? And if so, how should you respond?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"91 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81251050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
They walk among us: AI-based social engineering attacks 它们就在我们中间:基于人工智能的社会工程攻击
Q1 Social Sciences Pub Date : 2023-08-01 DOI: 10.12968/s1361-3723(23)70040-7
Samudhra Sendhil
Cyber criminals have not been slow to see the benefits of artificial intelligence. They have adopted generative AI as a means to improve their credibility and success rate in social engineering attacks. So how do you detect this abuse of AI, and what do you do about it?
网络犯罪分子在看到人工智能的好处方面并不迟钝。他们采用生成式人工智能作为提高他们在社会工程攻击中的可信度和成功率的手段。那么,你如何发现这种人工智能的滥用,你该怎么做?
{"title":"They walk among us: AI-based social engineering attacks","authors":"Samudhra Sendhil","doi":"10.12968/s1361-3723(23)70040-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70040-7","url":null,"abstract":"Cyber criminals have not been slow to see the benefits of artificial intelligence. They have adopted generative AI as a means to improve their credibility and success rate in social engineering attacks. So how do you detect this abuse of AI, and what do you do about it?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"108 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83441654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Think NIS2 isn't relevant to you? Think again 认为NIS2与你无关?再想想
Q1 Social Sciences Pub Date : 2023-08-01 DOI: 10.12968/s1361-3723(23)70039-0
Graham Hawkey
{"title":"Think NIS2 isn't relevant to you? Think again","authors":"Graham Hawkey","doi":"10.12968/s1361-3723(23)70039-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70039-0","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"74 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86299646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why cyber insurance has an image problem 为什么网络保险存在形象问题
Q1 Social Sciences Pub Date : 2023-07-01 DOI: 10.12968/s1361-3723(23)70030-4
Shari Gardner
For many organisations, cyber insurance is a tricky subject. The cost can be a disincentive, the process of insuring can be complex and it seems there is an increasing list of circumstances under which insurers will not pay out. But given the threats that all organisations face, can you really risk not being insured?
对于许多组织来说,网络保险是一个棘手的问题。费用可能是一种抑制因素,投保的过程可能很复杂,而且在越来越多的情况下,保险公司不会赔付。但考虑到所有组织都面临的威胁,你真的能冒着没有保险的风险吗?
{"title":"Why cyber insurance has an image problem","authors":"Shari Gardner","doi":"10.12968/s1361-3723(23)70030-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70030-4","url":null,"abstract":"For many organisations, cyber insurance is a tricky subject. The cost can be a disincentive, the process of insuring can be complex and it seems there is an increasing list of circumstances under which insurers will not pay out. But given the threats that all organisations face, can you really risk not being insured?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"12 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72484146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SOAR isn't a silver bullet SOAR并不是灵丹妙药
Q1 Social Sciences Pub Date : 2023-07-01 DOI: 10.12968/s1361-3723(23)70032-8
Tim Wallen
{"title":"SOAR isn't a silver bullet","authors":"Tim Wallen","doi":"10.12968/s1361-3723(23)70032-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70032-8","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87710166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A single point of failure? AI and network detection and response 单点故障?人工智能和网络检测与响应
Q1 Social Sciences Pub Date : 2023-07-01 DOI: 10.12968/s1361-3723(23)70031-6
Jacques de la Rivière
Artificial intelligence is creeping into everything, including network detection and response (NDR). But is faith in the new technology blinding us to some serious deficiencies and possible vulnerabilities?
人工智能正在渗透到所有领域,包括网络检测和响应(NDR)。但是,对新技术的信心是否使我们忽视了一些严重的缺陷和可能存在的漏洞?
{"title":"A single point of failure? AI and network detection and response","authors":"Jacques de la Rivière","doi":"10.12968/s1361-3723(23)70031-6","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70031-6","url":null,"abstract":"Artificial intelligence is creeping into everything, including network detection and response (NDR). But is faith in the new technology blinding us to some serious deficiencies and possible vulnerabilities?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74915463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social engineering the dispersed workforce 社会工程分散劳动力
Q1 Social Sciences Pub Date : 2023-07-01 DOI: 10.12968/s1361-3723(23)70033-x
C. Scott
The workplace has gone through a forced and dramatic change. Remote and hybrid working have been normalised, putting a huge strain on the technology infrastructures that support them and rendering many of our traditional cyber defences obsolete. Of all the threats that face today's workforce, social engineering is arguably the most pernicious and difficult to mitigate.
职场经历了一场被迫而剧烈的变化。远程和混合工作已经正常化,给支持它们的技术基础设施带来了巨大压力,并使我们的许多传统网络防御措施过时。在当今劳动力面临的所有威胁中,社会工程可以说是最有害的,也是最难缓解的。
{"title":"Social engineering the dispersed workforce","authors":"C. Scott","doi":"10.12968/s1361-3723(23)70033-x","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70033-x","url":null,"abstract":"The workplace has gone through a forced and dramatic change. Remote and hybrid working have been normalised, putting a huge strain on the technology infrastructures that support them and rendering many of our traditional cyber defences obsolete. Of all the threats that face today's workforce, social engineering is arguably the most pernicious and difficult to mitigate.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86482503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Fraud and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1