Duffany, 2017 - Google Patents
Computer securityDuffany, 2017
View PDF- Document ID
- 5944511437421267066
- Author
- Duffany J
- Publication year
- Publication venue
- Computer and Network Security Essentials
External Links
Snippet
An overview of basic computer security concepts is presented along with a brief history of major computer security events of the late twentieth and early twenty-first centuries. This is followed by a description of the most important computer security vulnerabilities that exist …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/30144—Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/3015—Redundancy elimination performed by the file system
- G06F17/30153—Redundancy elimination performed by the file system using compression, e.g. sparse files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/3015—Redundancy elimination performed by the file system
- G06F17/30156—De-duplication implemented within the file system, e.g. based on file segments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/3007—File system administration
- G06F17/30073—Details of archiving
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30091—File storage and access structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alenezi et al. | Evolution of malware threats and techniques: A review | |
Alharbi | Dealing with Data Breaches Amidst Changes In Technology. | |
Ozkaya et al. | Hands-On Cybersecurity for Finance: Identify vulnerabilities and secure your financial services from security breaches | |
Gupta et al. | Taxonomy of cloud security | |
Sajjan et al. | Ransomware attacks: Radical menace for cloud computing | |
Alhenaki et al. | Security in cloud computing: a survey | |
Alsmadi et al. | Practical information security | |
Newman | Cybercrime, identity theft, and fraud: practicing safe internet-network security threats and vulnerabilities | |
Rana et al. | Ransomware attacks in cyber-physical systems: countermeasure of attack vectors through automated web defenses | |
Sarwar et al. | Cryptovirology ransomware: A review of dissemination and mitigation techniques | |
Belmabrouk | Cyber criminals and data privacy measures | |
Omar | A world of cyber attacks (a survey) | |
Gunavathi et al. | Cybercrimes in the Associated World | |
Shah et al. | Appraisal of the Most Prominent Attacks due to vulnerabilities in cloud computing | |
Firmansyah | Cybersecurity Fundamentals | |
Duffany | Computer security | |
Shaikh et al. | Exploring recent challenges in cyber security and their solutions | |
Harris et al. | Cybersecurity in the golden state | |
Maurushat et al. | Artificial intelligence enabled cyber fraud: a detailed look into payment diversion fraud and ransomware | |
Gordon et al. | Cybersecurity & the Courthouse: safeguarding the judicial process | |
Virvilis-Kollitiris | Detecting advanced persistent threats through deception techniques | |
Narain | Ransomware-rising menace to an unsuspecting cyber audience | |
Elrom | Security and compliance | |
Prathyusha et al. | A study on cloud security issues | |
Akinola et al. | Introduction to Cyber-security |