Gkotsis, 2021 - Google Patents
Creating a windows active directory lab and performing simulated attacksGkotsis, 2021
View PDF- Document ID
- 10371729817873723121
- Author
- Gkotsis P
- Publication year
External Links
Snippet
Windows Active directory is the network directory developed by Microsoft. Active Directory stores information about objects on the network and makes this information easy for administrators and users to find and use. Active Directory uses a structured data store as the …
- 238000000034 method 0 description 63
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30943—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
- G06F17/30946—Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Indu et al. | Identity and access management in cloud environment: Mechanisms and challenges | |
US10122703B2 (en) | Federated full domain logon | |
US8209394B2 (en) | Device-specific identity | |
KR100920871B1 (en) | Methods and systems for authentication of a user for sub-locations of a network location | |
US8635671B2 (en) | Systems and methods for a security delegate module to select appropriate security services for web applications | |
JP5260634B2 (en) | Stepwise authentication system | |
US20140109179A1 (en) | Multiple server access management | |
EP1255179A2 (en) | Methods and arrangements for controlling access to resources based on authentication method | |
US7428748B2 (en) | Method and system for authentication in a business intelligence system | |
Ferretti et al. | Authorization transparency for accountable access to IoT services | |
Gkotsis | Creating a windows active directory lab and performing simulated attacks | |
Sagar et al. | Information security: safeguarding resources and building trust | |
De Clercq et al. | Microsoft Windows Security Fundamentals: For Windows 2003 SP1 and R2 | |
Moric et al. | Penetration testing and exploitation of Active Directory configuration vulnerabilities | |
Gupta et al. | Data security in data lakes | |
Beuchelt | UNIX and Linux security | |
Bertino et al. | Security for distributed systems—foundations of access control | |
Lampson | Practical principles for computer security | |
Smirnov | Engineering Authentication | |
Engineer et al. | Keeping the Data Secure | |
Tank et al. | Security analysis of OpenStack keystone | |
Clarke | Design and implementation of a public key-based group collaboration system | |
Lakhe | Open Source Authentication in Hadoop | |
Kizza et al. | Access control, authentication, and authorization | |
Haber et al. | Understanding Enterprise Identity |