[go: up one dir, main page]

Mansoor et al., 2019 - Google Patents

An analysis of security systems for electronic information for establishing secure internet

Mansoor et al., 2019

View PDF
Document ID
11605716889071509281
Author
Mansoor M
Dhahir M
Alshadoodee H
Publication year
Publication venue
International Journal of Innovation, Creativity and Change

External Links

Snippet

The modern integrated world is built on billions of web-servers that support the operation of information systems providing various functions from trading operations to e-government support. This set of systems contains not only personal data but financial information that …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links

Similar Documents

Publication Publication Date Title
Sinha et al. Information Security threats and attacks with conceivable counteraction
Lipson Tracking and tracing cyber-attacks: Technical challenges and global policy issues
Adiwal et al. Dns intrusion detection (did)—a snort-based solution to detect dns amplification and dns tunneling attacks
Nasser et al. Provably curb man-in-the-middle attack-based ARP spoofing in a local network
Kazienko et al. Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture)
Miller et al. Traffic classification for the detection of anonymous web proxy routing
Simkhada et al. Security threats/attacks via botnets and botnet detection & prevention techniques in computer networks: a review
Buchanan Introduction to security and network forensics
De Donno et al. A taxonomy of distributed denial of service attacks
Miller et al. Securing the internet through the detection of anonymous proxy usage
Kamal State of the art survey on session hijacking
Khari et al. Meticulous study of firewall using security detection tools
Pahal et al. Distributed Denial of Services attacks on cloud servers: Detection, Analysis, and Mitigation
Mansoor et al. An analysis of security systems for electronic information for establishing secure internet
Sichkar et al. A short survey of the capabilities of Next Generation firewalls
Durairaj et al. A study on securing cloud environment from DDoS attack to preserve data availability
Ahmad et al. Analysis of network security threats and vulnerabilities by development & implementation of a security network monitoring solution
Ramakrishnan et al. Pandora: An IOT based Intrusion Detection Honeypot with Real-time Monitoring
Pandey et al. Social engineering and exploit development
De Donno AntibIoTic: Securing the Internet of Things with Fog Computing
Garg et al. Security of Modern Networks and Its Challenges
Patel et al. IJDI-ERET
Nakato Networks Security: Attacks and Defense Mechanism by Designing an Intelligent Firewall Agent
Pal Botnets: A constant threat to Cyberspace
Waziri Jr Packet filter performance monitor (anti-DDOS algorithm for hybrid topologies)