首页 > 最新文献

Computer Fraud and Security最新文献

英文 中文
The year of the business-driven CISO 这是业务驱动型首席信息安全官的一年
Q1 Social Sciences Pub Date : 2023-02-01 DOI: 10.12968/s1361-3723(23)70010-9
Tim Wallen
{"title":"The year of the business-driven CISO","authors":"Tim Wallen","doi":"10.12968/s1361-3723(23)70010-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70010-9","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75476184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rethinking security with cloud native in mind 重新思考云原生的安全性
Q1 Social Sciences Pub Date : 2023-02-01 DOI: 10.12968/s1361-3723(23)70009-2
Rani Osnat
The cloud native application protection platform (CNAPP) is a response to growing threats against cloud-native architectures. But it's not a simple matter of picking an off-the-shelf solution. Organisations looking to reap the benefits of cloud-native applications need to carefully consider their security requirements too.
云原生应用程序保护平台(CNAPP)是对云原生架构日益增长的威胁的回应。但这并不是选择现成的解决方案那么简单。希望从云原生应用中获益的组织也需要仔细考虑他们的安全需求。
{"title":"Rethinking security with cloud native in mind","authors":"Rani Osnat","doi":"10.12968/s1361-3723(23)70009-2","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70009-2","url":null,"abstract":"The cloud native application protection platform (CNAPP) is a response to growing threats against cloud-native architectures. But it's not a simple matter of picking an off-the-shelf solution. Organisations looking to reap the benefits of cloud-native applications need to carefully consider their security requirements too.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80324381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How secure is your organisation? 你的组织有多安全?
Q1 Social Sciences Pub Date : 2023-02-01 DOI: 10.12968/s1361-3723(23)70008-0
Helen Masters
The threats facing organisations go beyond the cyber realm. We're heading into a tough economic climate and organisations must overcome a range of challenges. This could lead to cyber security slipping down the list of priorities. But this is no time to drop your guard. The fact is, in this environment you can't afford a cyber security incident.
企业面临的威胁超出了网络领域。我们正进入一个艰难的经济环境,组织必须克服一系列挑战。这可能导致网络安全从优先事项列表中滑落。但现在不是放松警惕的时候。事实是,在这种环境下,你承受不起网络安全事故。
{"title":"How secure is your organisation?","authors":"Helen Masters","doi":"10.12968/s1361-3723(23)70008-0","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70008-0","url":null,"abstract":"The threats facing organisations go beyond the cyber realm. We're heading into a tough economic climate and organisations must overcome a range of challenges. This could lead to cyber security slipping down the list of priorities. But this is no time to drop your guard. The fact is, in this environment you can't afford a cyber security incident.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91038875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial machine learning: the rise in AI-enabled crime 对抗性机器学习:人工智能犯罪的增加
Q1 Social Sciences Pub Date : 2023-02-01 DOI: 10.12968/s1361-3723(23)70007-9
Jahnavi Sivaram, Jigisha M Narrain, Prasad B. Honnavalli, Sivaraman Eswaran
The rise in frequency and consequence of cybercrimes enabled by artificial intelligence (AI) has been a cause of concern for decades. At the same time, we've seen the development of defensive capabilities. This article examines the mechanics of AI-enabled attacks. These include voice mimicking used for crime, and natural processing algorithms absorbing harmful and offensive human text patterns to create problematic virtual situations. It also looks at shadow models – evasion, infiltration and manipulation of machine-learning models through shadow modelling techniques are on the rise due to their straightforward development methods, allowing the identification of shortcomings in input features, which can cause misclassification by the model. With a special focus on spam filters, their structure and evasion techniques, we look at the ways in which artificial intelligence is being utilised to cause harm, concluding with a final analysis of the Proofpoint evasion case.
几十年来,人工智能(AI)导致的网络犯罪频率和后果的上升一直是人们关注的问题。与此同时,我们也看到了防御能力的发展。本文将研究启用ai的攻击机制。其中包括用于犯罪的语音模仿,以及吸收有害和冒犯性人类文本模式的自然处理算法,以创建有问题的虚拟场景。它还研究了影子模型——通过影子建模技术对机器学习模型的规避、渗透和操纵正在上升,因为它们的开发方法直截了当,允许识别输入特征中的缺点,这可能导致模型的错误分类。我们特别关注垃圾邮件过滤器,它们的结构和规避技术,看看人工智能被用来造成伤害的方式,最后对Proofpoint规避案例进行最终分析。
{"title":"Adversarial machine learning: the rise in AI-enabled crime","authors":"Jahnavi Sivaram, Jigisha M Narrain, Prasad B. Honnavalli, Sivaraman Eswaran","doi":"10.12968/s1361-3723(23)70007-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70007-9","url":null,"abstract":"The rise in frequency and consequence of cybercrimes enabled by artificial intelligence (AI) has been a cause of concern for decades. At the same time, we've seen the development of defensive capabilities. This article examines the mechanics of AI-enabled attacks. These include voice mimicking used for crime, and natural processing algorithms absorbing harmful and offensive human text patterns to create problematic virtual situations. It also looks at shadow models – evasion, infiltration and manipulation of machine-learning models through shadow modelling techniques are on the rise due to their straightforward development methods, allowing the identification of shortcomings in input features, which can cause misclassification by the model. With a special focus on spam filters, their structure and evasion techniques, we look at the ways in which artificial intelligence is being utilised to cause harm, concluding with a final analysis of the Proofpoint evasion case.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83206955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Curbing modern cyberthreats 遏制现代网络威胁
Q1 Social Sciences Pub Date : 2023-01-01 DOI: 10.12968/s1361-3723(23)70001-8
S. Desai
The current hybrid way of working has become a new playground for cyber criminals. Attacks of all kinds have increased as malicious actors have sought to exploit weaknesses in infrastructures that were hurriedly constructed to support remote working. The good news is that technology is rising to the challenge.
目前的混合工作方式已经成为网络罪犯的新游乐场。由于恶意行为者试图利用为支持远程工作而匆忙建造的基础设施的弱点,各种攻击都有所增加。好消息是,技术正在崛起,迎接挑战。
{"title":"Curbing modern cyberthreats","authors":"S. Desai","doi":"10.12968/s1361-3723(23)70001-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70001-8","url":null,"abstract":"The current hybrid way of working has become a new playground for cyber criminals. Attacks of all kinds have increased as malicious actors have sought to exploit weaknesses in infrastructures that were hurriedly constructed to support remote working. The good news is that technology is rising to the challenge.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85688815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A forensic method for investigating manipulated video recordings 一种调查被篡改录像的法医方法
Q1 Social Sciences Pub Date : 2023-01-01 DOI: 10.12968/s1361-3723(23)70003-1
Ilker Kara, Ceren Korkmaz, Alihan Karatatar, M. Aydos
Forensic image analysis can be used to resolve difficult incidents, such as the increasing number of child sexual abuse cases. Although the United Nations and European Union countries are trying to fight these crimes, criminals are developing new methods to circumvent the measures taken. Sharing videos that do not contain any criminal elements and inserting child sexual abuse videos between frames is a new method that has been seen recently. This article proposes a new method to analyse the videos prepared this way. The proposed method is particularly advantageous for detecting and analysing videos that have been manipulated and embedded in different content and can be applied as a new technique.
法医图像分析可以用来解决棘手的事件,比如越来越多的儿童性虐待案件。虽然联合国和欧洲联盟国家正在努力打击这些犯罪,但犯罪分子正在开发新的方法来规避所采取的措施。分享没有犯罪内容的视频,并在画面之间插入儿童性侵视频,是最近出现的新手法。本文提出了一种新的视频分析方法。该方法对于检测和分析被篡改和嵌入到不同内容中的视频特别有利,可以作为一种新技术加以应用。
{"title":"A forensic method for investigating manipulated video recordings","authors":"Ilker Kara, Ceren Korkmaz, Alihan Karatatar, M. Aydos","doi":"10.12968/s1361-3723(23)70003-1","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70003-1","url":null,"abstract":"Forensic image analysis can be used to resolve difficult incidents, such as the increasing number of child sexual abuse cases. Although the United Nations and European Union countries are trying to fight these crimes, criminals are developing new methods to circumvent the measures taken. Sharing videos that do not contain any criminal elements and inserting child sexual abuse videos between frames is a new method that has been seen recently. This article proposes a new method to analyse the videos prepared this way. The proposed method is particularly advantageous for detecting and analysing videos that have been manipulated and embedded in different content and can be applied as a new technique.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85486895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding the complexities of operational technology security 理解操作技术安全的复杂性
Q1 Social Sciences Pub Date : 2023-01-01 DOI: 10.12968/s1361-3723(23)70002-x
Eric Escobar
Many of the computer systems and networks most essential to our daily lives are invisible. They manage crucial infrastructure on which society depends. And yet many of these systems are surprisingly difficult to protect. Securing industrial control system (ICS) solutions and operational technology (OT) networks requires different approaches and tools compared to most conventional technology.
许多对我们日常生活至关重要的计算机系统和网络是看不见的。他们管理着社会赖以生存的关键基础设施。然而,这些系统中的许多都令人惊讶地难以保护。与大多数传统技术相比,保护工业控制系统(ICS)解决方案和操作技术(OT)网络需要不同的方法和工具。
{"title":"Understanding the complexities of operational technology security","authors":"Eric Escobar","doi":"10.12968/s1361-3723(23)70002-x","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70002-x","url":null,"abstract":"Many of the computer systems and networks most essential to our daily lives are invisible. They manage crucial infrastructure on which society depends. And yet many of these systems are surprisingly difficult to protect. Securing industrial control system (ICS) solutions and operational technology (OT) networks requires different approaches and tools compared to most conventional technology.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"80 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91024215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The perfect cyber storm – security budgets, skills shortages and automated attacks 完美的网络风暴——安全预算、技能短缺和自动化攻击
Q1 Social Sciences Pub Date : 2023-01-01 DOI: 10.12968/s1361-3723(23)70004-3
Phil Robinson
A combination of economic pressures, sophisticated assaults that maximise returns and a shortage of skilled professionals now mean that businesses can expect to become increasingly vulnerable to attack as they enter 2023.
经济压力、将回报最大化的复杂攻击以及熟练专业人员的短缺,这些因素综合起来意味着,进入2023年,企业可能会越来越容易受到攻击。
{"title":"The perfect cyber storm – security budgets, skills shortages and automated attacks","authors":"Phil Robinson","doi":"10.12968/s1361-3723(23)70004-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(23)70004-3","url":null,"abstract":"A combination of economic pressures, sophisticated assaults that maximise returns and a shortage of skilled professionals now mean that businesses can expect to become increasingly vulnerable to attack as they enter 2023.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"37 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83553646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deciphering Conti and the need for effective SOCs 破译Conti和对有效soc的需求
Q1 Social Sciences Pub Date : 2022-12-01 DOI: 10.12968/s1361-3723(22)70604-5
S. Goodwin
Conti has proven to be one of the most virulent forms of ransomware. It has caused untold damage, and many organisations struggle to combat this kind of threat on their own. This is where a security partner, with an effective and experienced security operations centre (SOC), can play a key role.
事实证明,Conti是最致命的勒索软件之一。它造成了难以估量的损害,许多组织都在努力独自对抗这种威胁。这就是拥有高效且经验丰富的安全运营中心(SOC)的安全合作伙伴可以发挥关键作用的地方。
{"title":"Deciphering Conti and the need for effective SOCs","authors":"S. Goodwin","doi":"10.12968/s1361-3723(22)70604-5","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70604-5","url":null,"abstract":"Conti has proven to be one of the most virulent forms of ransomware. It has caused untold damage, and many organisations struggle to combat this kind of threat on their own. This is where a security partner, with an effective and experienced security operations centre (SOC), can play a key role.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81833169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The threats to Jupyter Notebook 木星笔记本的威胁
Q1 Social Sciences Pub Date : 2022-12-01 DOI: 10.12968/s1361-3723(22)70606-9
Assaf Morag
The popular data practitioners’ tool, Jupyter Notebook, has become the victim of a Python-based ransomware attack for the first time. The popular open-source platform is vulnerable to misconfiguration, which could leave your servers wide open to attack.
流行的数据从业者工具Jupyter Notebook首次成为基于python的勒索软件攻击的受害者。流行的开源平台容易受到错误配置的影响,这可能使您的服务器容易受到攻击。
{"title":"The threats to Jupyter Notebook","authors":"Assaf Morag","doi":"10.12968/s1361-3723(22)70606-9","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70606-9","url":null,"abstract":"The popular data practitioners’ tool, Jupyter Notebook, has become the victim of a Python-based ransomware attack for the first time. The popular open-source platform is vulnerable to misconfiguration, which could leave your servers wide open to attack.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89279971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Fraud and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1