Carthern et al., 2021 - Google Patents
Advanced SecurityCarthern et al., 2021
- Document ID
- 12341772158804272106
- Author
- Carthern C
- Wilson W
- Rivera N
- Publication year
- Publication venue
- Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
External Links
Snippet
Before we start, let's be realistic about the expectations that there cannot be a 100% secure information system (IS) nor can we cover every advanced security topic in a single chapter. There are too many factors to evaluate that are out of your control, including the human …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/468—Specific access rights for resources, e.g. using capability register
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ferrazani Mattos et al. | AuthFlow: authentication and access control mechanism for software defined networking | |
US9413723B2 (en) | Configuring and managing remote security devices | |
US20080022392A1 (en) | Resolution of attribute overlap on authentication, authorization, and accounting servers | |
US20160352731A1 (en) | Network access control at controller | |
EP4323898B1 (en) | Computer-implemented methods and systems for establishing and/or controlling network connectivity | |
Nife et al. | New SDN-oriented distributed network security system | |
Hauser et al. | P4sec: Automated deployment of 802.1 X, IPsec, and MACsec network protection in P4-based SDN | |
Cisco | Index | |
Carthern et al. | Advanced Security | |
Frahim et al. | Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance | |
Cameron et al. | Configuring Juniper Networks NetScreen and SSG Firewalls | |
Mwape | Performance evaluation of internet protocol security (IPSec) over multiprotocol label switching (MPLS). | |
Piens | Mastering Palo Alto Networks | |
Martins et al. | An Extensible Access Control Architecture for Software Defined Networks based on X. 812 | |
US20250240175A1 (en) | Methods and systems for implementing secure communication channels between systems over a network | |
Hausman et al. | CompTIA Security+ SY0-301 Exam Cram | |
Mohammed | Performance Analysis of IPSEC over Internet Protocol version 6 Networks | |
Matei | CCNP Security VPN 642-647 Quick Reference | |
Degefa | VPN Scenarios, Configuration and Analysis:- | |
Bendell | Configuring SonicWALL Firewalls | |
Mason | CCNP Security Secure 642-637 Quick Reference | |
Tabassum et al. | Network capability analysis and related implementations improvements recommendations | |
Myllykangas | Integrating Next-Generation Firewalls into a Private Cloud Datacenter | |
Matei | CCNP Security VPN 642-648 Quick Reference | |
Simone | 9, Author retains full rights. |