Tomhave et al., 2004 - Google Patents
Information security technologiesTomhave et al., 2004
View PDF- Document ID
- 12245310960592720865
- Author
- Tomhave B
- Carothers D
- Publication year
- Publication venue
- Washington, DC: The George Washington University
External Links
Snippet
The following research paper provides analysis of thirteen (13) information security technology topics, arranged in ten (10) groups, that are either commonly found or emerging within the information security industry. These topics include: Access Control Management …
- 238000001514 detection method 0 abstract description 70
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mallick et al. | Navigating the cyber security landscape: A comprehensive review of cyber-attacks, emerging trends, and recent developments | |
Cole | Network security bible | |
Arogundade | Network security concepts, dangers, and defense best practical | |
US20120185915A1 (en) | Secure enterprise network | |
Chauhan | Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus | |
Mohammed et al. | Automatic defense against zero-day polymorphic worms in communication networks | |
Siddiqui et al. | Survey on unified threat management (UTM) systems for home networks | |
Banoth et al. | Implementation and mitigation for cyber attacks with proposed OCR process model. | |
Singh et al. | Enhancing VPN security through security policy management | |
CN116723048A (en) | Communication system and method in local area network | |
Ebong et al. | Comprehensive impact assessment of intrusion detection and mitigation strategies using support vector machine classification | |
Pedapudi et al. | A Comprehensive Network Security Management in Virtual Private Network Environment | |
Singh et al. | CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260) | |
Fawcett | ExFILD: A tool for the detection of data exfiltration using entropy and encryption characteristics of network traffic | |
Rogers et al. | Mitigating Higher Ed Cyber Attacks. | |
CHOPRA et al. | Cyber-Attacks Identification and Measures for Prevention | |
Ahmad et al. | Analysis of network security threats and vulnerabilities by development & implementation of a security network monitoring solution | |
SOX | This White Paper | |
Tomhave et al. | Information security technologies | |
Bottino | Security Measures in a secure computer communications architecture | |
Atanasov | From Firewall to AI: Strengthening Linux Server Security | |
US20240250968A1 (en) | Detecting scanning and attacking uniform resource locators in network traffic | |
Pathak | The Review of Terms and Concepts used to Understand Cybercrime to Safeguard Ourselves from Cybercriminals. | |
Soriano | Information and network security | |
Sarvepalli | Designing Network Security Labs |