[go: up one dir, main page]

Duffany, 2017 - Google Patents

Computer security

Duffany, 2017

View PDF
Document ID
5944511437421267066
Author
Duffany J
Publication year
Publication venue
Computer and Network Security Essentials

External Links

Snippet

An overview of basic computer security concepts is presented along with a brief history of major computer security events of the late twentieth and early twenty-first centuries. This is followed by a description of the most important computer security vulnerabilities that exist …
Continue reading at ndl.ethernet.edu.et (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30129Details of further file system functionalities
    • G06F17/30144Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30129Details of further file system functionalities
    • G06F17/3015Redundancy elimination performed by the file system
    • G06F17/30153Redundancy elimination performed by the file system using compression, e.g. sparse files
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30129Details of further file system functionalities
    • G06F17/3015Redundancy elimination performed by the file system
    • G06F17/30156De-duplication implemented within the file system, e.g. based on file segments
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/3007File system administration
    • G06F17/30073Details of archiving
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30091File storage and access structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection

Similar Documents

Publication Publication Date Title
Alenezi et al. Evolution of malware threats and techniques: A review
Alharbi Dealing with Data Breaches Amidst Changes In Technology.
Ozkaya et al. Hands-On Cybersecurity for Finance: Identify vulnerabilities and secure your financial services from security breaches
Gupta et al. Taxonomy of cloud security
Sajjan et al. Ransomware attacks: Radical menace for cloud computing
Alhenaki et al. Security in cloud computing: a survey
Alsmadi et al. Practical information security
Newman Cybercrime, identity theft, and fraud: practicing safe internet-network security threats and vulnerabilities
Rana et al. Ransomware attacks in cyber-physical systems: countermeasure of attack vectors through automated web defenses
Sarwar et al. Cryptovirology ransomware: A review of dissemination and mitigation techniques
Belmabrouk Cyber criminals and data privacy measures
Omar A world of cyber attacks (a survey)
Gunavathi et al. Cybercrimes in the Associated World
Shah et al. Appraisal of the Most Prominent Attacks due to vulnerabilities in cloud computing
Firmansyah Cybersecurity Fundamentals
Duffany Computer security
Shaikh et al. Exploring recent challenges in cyber security and their solutions
Harris et al. Cybersecurity in the golden state
Maurushat et al. Artificial intelligence enabled cyber fraud: a detailed look into payment diversion fraud and ransomware
Gordon et al. Cybersecurity & the Courthouse: safeguarding the judicial process
Virvilis-Kollitiris Detecting advanced persistent threats through deception techniques
Narain Ransomware-rising menace to an unsuspecting cyber audience
Elrom Security and compliance
Prathyusha et al. A study on cloud security issues
Akinola et al. Introduction to Cyber-security