Upadhyaya et al., 2022 - Google Patents
A Novel Method for Trusted Audit and Compliance for Network Devices by Using BlockchainUpadhyaya et al., 2022
- Document ID
- 5262576963768222664
- Author
- Upadhyaya S
- Thangaraju B
- Publication year
- Publication venue
- 2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)
External Links
Snippet
The Network Security and Risk (NSR) management team in an enterprise is responsible for maintaining the network which includes switches, routers, firewalls, controllers, etc. Due to the ever-increasing threat of capitalizing on the vulnerabilities to create cyber-attacks across …
- 238000000034 method 0 abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8434129B2 (en) | Method and apparatus for multi-domain identity interoperability and compliance verification | |
Paxson et al. | Experiences with NIMI | |
CN110598446A (en) | Block chain based test method and device, storage medium and computer equipment | |
US20150347751A1 (en) | System and method for monitoring data in a client environment | |
Serketzis et al. | Actionable threat intelligence for digital forensics readiness | |
CN111694743A (en) | Service system detection method and device | |
CN116583833A (en) | Self-Auditing Blockchain | |
Berbecaru et al. | An evaluation of X. 509 certificate revocation and related privacy issues in the web PKI ecosystem | |
CN112132554A (en) | A government information processing method, device, electronic device and storage medium | |
US20200364192A1 (en) | Efficient and automatic database patching using elevated privileges | |
Basney et al. | Investigating root causes of authentication failures using a saml and oidc observatory | |
US20250225059A1 (en) | Generating Test Data Based On Actual Usage Data | |
Upadhyaya et al. | A Novel Method for Trusted Audit and Compliance for Network Devices by Using Blockchain | |
Bilar | Quantitative risk analysis of computer networks | |
Takahashi et al. | Structured cybersecurity information exchange for streamlining incident response operations | |
Hai et al. | Evaluating the security levels of the Web-Portals based on the standard ISO/IEC 15408 | |
Aslam et al. | ASArP: automated security assessment & audit of remote platforms using TCG-SCAP synergies | |
Alqahtani | A novel approach to providing secure data storage using multi cloud computing | |
Heed et al. | Deliverable D8. 6 Vulnerability Assessment as a Service Pilot Project | |
Pritz | Shell activity logging and auditing in exercise environments of security Lectures using OSS | |
Moreno Ribot | Assessing modern web applications security | |
Bufalino et al. | Inside Job: Defending Kubernetes Clusters Against Network Misconfigurations | |
Mushi et al. | Designing for proactive network configuration analysis | |
Brunet | Consulting in Computer Systems and Software | |
Goldschmidt | Suitability of Hardware Security Modules for Securing Remote Access in High-Performance Environments |