首页 > 最新文献

Computer Fraud and Security最新文献

英文 中文
The psychological problem with ransomware 勒索软件的心理问题
Q1 Social Sciences Pub Date : 2022-12-01 DOI: 10.12968/s1361-3723(22)70605-7
Bec McKeown
Our fears about being targeted by a cyber attack are understood – and exploited – by malicious actors. This is why, in building your defences against attacks – especially ransomware – you need to consider the psychological factors.
我们对成为网络攻击目标的担忧被恶意行为者理解并利用。这就是为什么,在建立防御攻击——尤其是勒索软件——的防御时,你需要考虑心理因素。
{"title":"The psychological problem with ransomware","authors":"Bec McKeown","doi":"10.12968/s1361-3723(22)70605-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70605-7","url":null,"abstract":"Our fears about being targeted by a cyber attack are understood – and exploited – by malicious actors. This is why, in building your defences against attacks – especially ransomware – you need to consider the psychological factors.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"225 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90071152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why do we silo cyber security when criminals don't? 为什么我们把网络安全隔离起来,而罪犯却没有?
Q1 Social Sciences Pub Date : 2022-12-01 DOI: 10.12968/s1361-3723(22)70603-3
G. Golan
Organisations rely on a number of suppliers to provide a wide range of security solutions and services. This creates complexity that attackers can exploit. So what can we do about this?
组织依靠许多供应商来提供广泛的安全解决方案和服务。这就造成了攻击者可以利用的复杂性。那么我们能做些什么呢?
{"title":"Why do we silo cyber security when criminals don't?","authors":"G. Golan","doi":"10.12968/s1361-3723(22)70603-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70603-3","url":null,"abstract":"Organisations rely on a number of suppliers to provide a wide range of security solutions and services. This creates complexity that attackers can exploit. So what can we do about this?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83898965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimising fraud in a post-Covid world 在后新冠时代最大限度地减少欺诈
Q1 Social Sciences Pub Date : 2022-11-01 DOI: 10.12968/s1361-3723(22)70600-8
James Richardson
Working from home has increased fraud in the UK and the US. At the same time, the amount and value of fraud has increased, according to recent figures. This means that companies must be extra-vigilant as our ways of working continue to evolve.
在家办公增加了英国和美国的欺诈行为。与此同时,根据最近的数据,欺诈的数量和价值都有所增加。这意味着,随着我们的工作方式不断演变,企业必须格外警惕。
{"title":"Minimising fraud in a post-Covid world","authors":"James Richardson","doi":"10.12968/s1361-3723(22)70600-8","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70600-8","url":null,"abstract":"Working from home has increased fraud in the UK and the US. At the same time, the amount and value of fraud has increased, according to recent figures. This means that companies must be extra-vigilant as our ways of working continue to evolve.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88948800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new era of bank security challenges 银行安全面临新时代的挑战
Q1 Social Sciences Pub Date : 2022-11-01 DOI: 10.12968/s1361-3723(22)70602-1
Matt Tengwall
Beyond the human toll exacted by the Covid-19 pandemic, one of the most significant lasting impacts of the spread of the virus and its numerous variants will be how it fundamentally changed business operations for many industries, and banking is no exception. As work and consumer habits due to the pandemic, financial institutions must evolve their security programmes accordingly.
除了Covid-19大流行造成的人员伤亡之外,该病毒及其众多变种的传播最重要的持久影响之一将是它如何从根本上改变许多行业的业务运营,银行业也不例外。由于疫情影响了工作和消费者习惯,金融机构必须相应地改进其安全方案。
{"title":"A new era of bank security challenges","authors":"Matt Tengwall","doi":"10.12968/s1361-3723(22)70602-1","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70602-1","url":null,"abstract":"Beyond the human toll exacted by the Covid-19 pandemic, one of the most significant lasting impacts of the spread of the virus and its numerous variants will be how it fundamentally changed business operations for many industries, and banking is no exception. As work and consumer habits due to the pandemic, financial institutions must evolve their security programmes accordingly.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81390850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the organisation by protecting the individual 通过保护个人来保护组织
Q1 Social Sciences Pub Date : 2022-11-01 DOI: 10.12968/s1361-3723(22)70599-4
Katie Petrillo
The whole world has gone through a digital transformation, radically changing the nature of work. But are individual employees properly prepared for this change? And are they being given the protections they need to keep themselves – and the organisations they work for – safe?
整个世界都经历了数字化转型,从根本上改变了工作的本质。但是,个别员工是否为这种变化做好了充分的准备?他们是否得到了必要的保护,以保证自己——以及他们为之工作的组织——的安全?
{"title":"Securing the organisation by protecting the individual","authors":"Katie Petrillo","doi":"10.12968/s1361-3723(22)70599-4","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70599-4","url":null,"abstract":"The whole world has gone through a digital transformation, radically changing the nature of work. But are individual employees properly prepared for this change? And are they being given the protections they need to keep themselves – and the organisations they work for – safe?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"61 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78045230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preventing ransomware – doing the impossible? 防止勒索软件——做不可能的事?
Q1 Social Sciences Pub Date : 2022-11-01 DOI: 10.12968/s1361-3723(22)70598-2
Henry b. Harrison
As cyber criminals and their tools become more sophisticated, organisations are becoming increasingly reliant on their first line of defence – their staff – to combat threats. This requires a high level of awareness. But is it reasonable to expect employees to have such an advanced understanding of the dangers?
随着网络罪犯和他们的工具变得越来越复杂,组织越来越依赖于他们的第一道防线——他们的员工——来对抗威胁。这需要高度的意识。但是,期望员工对危险有如此深入的了解是合理的吗?
{"title":"Preventing ransomware – doing the impossible?","authors":"Henry b. Harrison","doi":"10.12968/s1361-3723(22)70598-2","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70598-2","url":null,"abstract":"As cyber criminals and their tools become more sophisticated, organisations are becoming increasingly reliant on their first line of defence – their staff – to combat threats. This requires a high level of awareness. But is it reasonable to expect employees to have such an advanced understanding of the dangers?","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90835648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mind the gap between cyber security spend, budgets and awareness 注意网络安全支出、预算和意识之间的差距
Q1 Social Sciences Pub Date : 2022-11-01 DOI: 10.12968/s1361-3723(22)70601-x
Erick Barnes
{"title":"Mind the gap between cyber security spend, budgets and awareness","authors":"Erick Barnes","doi":"10.12968/s1361-3723(22)70601-x","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70601-x","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72945719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The rise of phishing: what your staff needs to know 网络钓鱼的兴起:你的员工需要知道什么
Q1 Social Sciences Pub Date : 2022-10-01 DOI: 10.12968/s1361-3723(22)70595-7
Phishing attacks have surged in waves over the past 18 months, capitalising on the fear and uncertainty caused by the Covid-19 pandemic. Yet these media-publicised waves overshadow the fact that phishing attacks, year over year, have continued their inevitable climb to reach peak numbers through pandemic-related topics
在过去的18个月里,利用Covid-19大流行造成的恐惧和不确定性,网络钓鱼攻击激增。然而,这些媒体宣传的浪潮掩盖了这样一个事实,即网络钓鱼攻击年复一年地继续攀升,通过与流行病相关的话题达到峰值
{"title":"The rise of phishing: what your staff needs to know","authors":"","doi":"10.12968/s1361-3723(22)70595-7","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70595-7","url":null,"abstract":"Phishing attacks have surged in waves over the past 18 months, capitalising on the fear and uncertainty caused by the Covid-19 pandemic. Yet these media-publicised waves overshadow the fact that phishing attacks, year over year, have continued their inevitable climb to reach peak numbers through pandemic-related topics","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88707008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Slow down and frown to improve phishing detection 慢下来,皱眉,提高网络钓鱼检测
Q1 Social Sciences Pub Date : 2022-10-01 DOI: 10.12968/s1361-3723(22)70593-3
Patricia A. Nevin, K. Renaud, George Finney
The move to ‘digital first’ has led to increasing dependence on online services, which increases susceptibility to security incidents. 1 Human behaviours can compromise organisational information security, with myriad perpetrators willing to exploit the human propensity to trust in order to achieve such compromises. 2 Phishing emails – which present recipients with an email containing a fraudulent link or a rogue attachment that can lead to the installation of malware or facilitate a ransomware attack – are a key attack vector. But encouraging users to slow down when processing emails can help combat this threat.
向“数字优先”的转变导致对在线服务的依赖日益增加,这增加了对安全事件的敏感性。人类的行为可能危害组织的信息安全,无数的犯罪者愿意利用人类的信任倾向来实现这种危害。网络钓鱼电子邮件是一种主要的攻击媒介,它向收件人发送包含欺诈链接或流氓附件的电子邮件,可能导致安装恶意软件或促进勒索软件攻击。但是鼓励用户在处理电子邮件时放慢速度可以帮助对抗这种威胁。
{"title":"Slow down and frown to improve phishing detection","authors":"Patricia A. Nevin, K. Renaud, George Finney","doi":"10.12968/s1361-3723(22)70593-3","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70593-3","url":null,"abstract":"The move to ‘digital first’ has led to increasing dependence on online services, which increases susceptibility to security incidents. 1 Human behaviours can compromise organisational information security, with myriad perpetrators willing to exploit the human propensity to trust in order to achieve such compromises. 2 Phishing emails – which present recipients with an email containing a fraudulent link or a rogue attachment that can lead to the installation of malware or facilitate a ransomware attack – are a key attack vector. But encouraging users to slow down when processing emails can help combat this threat.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"321 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80233111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Waking up to the encryption advantage 意识到加密的优势
Q1 Social Sciences Pub Date : 2022-10-01 DOI: 10.12968/s1361-3723(22)70594-5
J. Fielding
{"title":"Waking up to the encryption advantage","authors":"J. Fielding","doi":"10.12968/s1361-3723(22)70594-5","DOIUrl":"https://doi.org/10.12968/s1361-3723(22)70594-5","url":null,"abstract":"","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74618611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Fraud and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1