首页 > 最新文献

Computer Fraud and Security最新文献

英文 中文
Are we smart enough for smart technology? 我们是否足够聪明,能够接受智能技术?
Q1 Social Sciences Pub Date : 2023-05-01 DOI: 10.12968/s1361-3723(23)70021-3
Sareena Heer, S. Alghamdi, S. Furnell
It's common to find any number of ‘smart’ devices in the modern home, with the most common being so-called smart speakers. Despite their huge popularity, people often view these devices with at least some degree of suspicion, with concerns about security and privacy. With this in mind, this article presents the details of a study conducted among current smart speaker users to examine their awareness and understanding of the security and privacy aspects of the devices that they are already using.
现代家庭中随处可见各种“智能”设备,其中最常见的就是所谓的智能扬声器。尽管这些设备非常受欢迎,但人们经常带着某种程度的怀疑看待它们,担心安全和隐私。考虑到这一点,本文介绍了在当前智能扬声器用户中进行的一项研究的细节,以检查他们对已经使用的设备的安全和隐私方面的认识和理解。
{"title":"Are we smart enough for smart technology?","authors":"Sareena Heer, S. Alghamdi, S. Furnell","doi":"10.12968/s1361-3723(23)70021-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70021-3","url":null,"abstract":"It's common to find any number of ‘smart’ devices in the modern home, with the most common being so-called smart speakers. Despite their huge popularity, people often view these devices with at least some degree of suspicion, with concerns about security and privacy. With this in mind, this article presents the details of a study conducted among current smart speaker users to examine their awareness and understanding of the security and privacy aspects of the devices that they are already using.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"163 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83146149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The J-L of cyber security 网络安全的J-L
Q1 Social Sciences Pub Date : 2023-04-01 DOI: 10.12968/s1361-3723(23)70018-3
K. Renaud
{"title":"The J-L of cyber security","authors":"K. Renaud","doi":"10.12968/s1361-3723(23)70018-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70018-3","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81794286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud as a malware infiltration channel 云作为恶意软件渗透的渠道
Q1 Social Sciences Pub Date : 2023-04-01 DOI: 10.12968/s1361-3723(23)70016-x
Raymond Canzanese
It sometimes seems like everything is moving to the cloud, from the apps we use on our phones to major enterprise infrastructure. The result is that your IT landscape is always, to some extent, hybrid, with connections out to, and in from, the cloud at multiple points. The question you need to ask is whether this is opening up holes in your defences by exploiting channels and protocols that you inherently trust. This article examines the increasing popularity of cloud apps as a malware infiltration channel based on real-world data, and highlights potential mitigation strategies.
有时候,从我们在手机上使用的应用程序到主要的企业基础设施,似乎一切都在向云转移。其结果是,在某种程度上,您的IT环境始终是混合的,在多个点上有与云的连接和与云的连接。您需要问的问题是,这是否通过利用您天生信任的通道和协议在您的防御中打开了漏洞。本文研究了云应用程序作为基于真实世界数据的恶意软件渗透渠道的日益流行,并重点介绍了潜在的缓解策略。
{"title":"Cloud as a malware infiltration channel","authors":"Raymond Canzanese","doi":"10.12968/s1361-3723(23)70016-x","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70016-x","url":null,"abstract":"It sometimes seems like everything is moving to the cloud, from the apps we use on our phones to major enterprise infrastructure. The result is that your IT landscape is always, to some extent, hybrid, with connections out to, and in from, the cloud at multiple points. The question you need to ask is whether this is opening up holes in your defences by exploiting channels and protocols that you inherently trust. This article examines the increasing popularity of cloud apps as a malware infiltration channel based on real-world data, and highlights potential mitigation strategies.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86535375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Squeezing the security budget 安保预算吃紧
Q1 Social Sciences Pub Date : 2023-04-01 DOI: 10.12968/s1361-3723(23)70017-1
Steve Mansfield-Devine
Organisations currently face huge economic pressures, and many of them are having to cut their budgets. But is cyber security really something you can afford to skimp on? And if savings have to be made, are there ways you can spend your security dollar more wisely?
组织目前面临巨大的经济压力,许多组织不得不削减预算。但网络安全真的是你可以省吃俭用的吗?如果你必须要存钱,有什么方法可以让你更明智地使用你的安全资金吗?
{"title":"Squeezing the security budget","authors":"Steve Mansfield-Devine","doi":"10.12968/s1361-3723(23)70017-1","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70017-1","url":null,"abstract":"Organisations currently face huge economic pressures, and many of them are having to cut their budgets. But is cyber security really something you can afford to skimp on? And if savings have to be made, are there ways you can spend your security dollar more wisely?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85768436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing a shared SOC 开发共享SOC
Q1 Social Sciences Pub Date : 2023-04-01 DOI: 10.12968/s1361-3723(23)70019-5
Martin Walsham
A security operations centre (SOC) provides a critical security function to detect and defend from cyber security attacks. It is the last line of defence as part of an organisation's overall security control set. But not every organisation can, or should, run its own SOC.
安全运营中心(SOC)为检测和防御网络安全攻击提供了关键的安全功能。作为组织整体安全控制集的一部分,它是最后一道防线。但并不是每个组织都可以或应该运行自己的SOC。
{"title":"Developing a shared SOC","authors":"Martin Walsham","doi":"10.12968/s1361-3723(23)70019-5","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70019-5","url":null,"abstract":"A security operations centre (SOC) provides a critical security function to detect and defend from cyber security attacks. It is the last line of defence as part of an organisation's overall security control set. But not every organisation can, or should, run its own SOC.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91280434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Getting ahead of the attackers 赶在攻击者前面
Q1 Social Sciences Pub Date : 2023-03-01 DOI: 10.12968/s1361-3723(23)70011-0
D. Garcia
Security is often reactive – responding to new forms of attack and trying to patch vulnerabilities before threat actors exploit them. It often seems difficult to get ahead of the curve, to secure the organisation in a considered and systematic way, rather than just firefighting the latest disaster.
安全性通常是被动的——对新形式的攻击做出响应,并在威胁参与者利用漏洞之前尝试修补漏洞。要走在潮流的前面,以一种经过深思熟虑和系统的方式确保组织的安全,而不仅仅是扑灭最新的灾难,似乎往往很困难。
{"title":"Getting ahead of the attackers","authors":"D. Garcia","doi":"10.12968/s1361-3723(23)70011-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70011-0","url":null,"abstract":"Security is often reactive – responding to new forms of attack and trying to patch vulnerabilities before threat actors exploit them. It often seems difficult to get ahead of the curve, to secure the organisation in a considered and systematic way, rather than just firefighting the latest disaster.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"63 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80183692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Brace for an uptick in insider fraud 准备好迎接内幕欺诈的上升吧
Q1 Social Sciences Pub Date : 2023-03-01 DOI: 10.12968/s1361-3723(23)70012-2
Omri Kletter
{"title":"Brace for an uptick in insider fraud","authors":"Omri Kletter","doi":"10.12968/s1361-3723(23)70012-2","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70012-2","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"71 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90618383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why is zero trust so difficult? 为什么零信任这么难?
Q1 Social Sciences Pub Date : 2023-03-01 DOI: 10.12968/s1361-3723(23)70014-6
Phil Robinson
A zero-trust architecture offers significant security benefits and has become one of the most-discussed topics in information security. It's proven to offer high levels of breach prevention and has been shown to greatly reduce the costs of those organisations that are breached. So why is full adoption so slow, even among those organisations that have embraced the concept?
零信任体系结构提供了显著的安全优势,并已成为信息安全中讨论最多的主题之一。事实证明,它提供了高水平的入侵预防,并已被证明大大降低了那些被入侵的组织的成本。那么,为什么全面采用的速度如此之慢,甚至在那些已经接受了这一概念的组织中也是如此?
{"title":"Why is zero trust so difficult?","authors":"Phil Robinson","doi":"10.12968/s1361-3723(23)70014-6","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70014-6","url":null,"abstract":"A zero-trust architecture offers significant security benefits and has become one of the most-discussed topics in information security. It's proven to offer high levels of breach prevention and has been shown to greatly reduce the costs of those organisations that are breached. So why is full adoption so slow, even among those organisations that have embraced the concept?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81135790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber insurance is no longer optional 网络保险不再是可有可无的选择
Q1 Social Sciences Pub Date : 2023-03-01 DOI: 10.12968/s1361-3723(23)70015-8
M. Warren
{"title":"Cyber insurance is no longer optional","authors":"M. Warren","doi":"10.12968/s1361-3723(23)70015-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70015-8","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82549084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Now is the time to invest in cyber 现在是投资网络的时候了
Q1 Social Sciences Pub Date : 2023-03-01 DOI: 10.12968/s1361-3723(23)70013-4
Miri Marciano
Cyber threats are not new, but the scale of the attacks we're seeing and the damage they are causing is unprecedented. If you haven't already put in place cyber defences, your organisation is at risk and may be facing an existential threat. This means that everyone who has been putting off investing in information security solutions needs to reconsider – and quickly.
网络威胁并不新鲜,但我们所看到的攻击规模及其造成的破坏是前所未有的。如果你还没有实施网络防御,你的组织就处于危险之中,可能面临着生死存亡的威胁。这意味着每一个推迟投资于信息安全解决方案的人都需要重新考虑——而且要快。
{"title":"Now is the time to invest in cyber","authors":"Miri Marciano","doi":"10.12968/s1361-3723(23)70013-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70013-4","url":null,"abstract":"Cyber threats are not new, but the scale of the attacks we're seeing and the damage they are causing is unprecedented. If you haven't already put in place cyber defences, your organisation is at risk and may be facing an existential threat. This means that everyone who has been putting off investing in information security solutions needs to reconsider – and quickly.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90235307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Fraud and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1