[go: up one dir, main page]

Carthern et al., 2021 - Google Patents

Advanced Security

Carthern et al., 2021

Document ID
12341772158804272106
Author
Carthern C
Wilson W
Rivera N
Publication year
Publication venue
Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA

External Links

Snippet

Before we start, let's be realistic about the expectations that there cannot be a 100% secure information system (IS) nor can we cover every advanced security topic in a single chapter. There are too many factors to evaluate that are out of your control, including the human …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/468Specific access rights for resources, e.g. using capability register
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/44Arrangements for executing specific programmes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices

Similar Documents

Publication Publication Date Title
Ferrazani Mattos et al. AuthFlow: authentication and access control mechanism for software defined networking
US9413723B2 (en) Configuring and managing remote security devices
US20080022392A1 (en) Resolution of attribute overlap on authentication, authorization, and accounting servers
US20160352731A1 (en) Network access control at controller
EP4323898B1 (en) Computer-implemented methods and systems for establishing and/or controlling network connectivity
Nife et al. New SDN-oriented distributed network security system
Hauser et al. P4sec: Automated deployment of 802.1 X, IPsec, and MACsec network protection in P4-based SDN
Cisco Index
Carthern et al. Advanced Security
Frahim et al. Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance
Cameron et al. Configuring Juniper Networks NetScreen and SSG Firewalls
Mwape Performance evaluation of internet protocol security (IPSec) over multiprotocol label switching (MPLS).
Piens Mastering Palo Alto Networks
Martins et al. An Extensible Access Control Architecture for Software Defined Networks based on X. 812
US20250240175A1 (en) Methods and systems for implementing secure communication channels between systems over a network
Hausman et al. CompTIA Security+ SY0-301 Exam Cram
Mohammed Performance Analysis of IPSEC over Internet Protocol version 6 Networks
Matei CCNP Security VPN 642-647 Quick Reference
Degefa VPN Scenarios, Configuration and Analysis:-
Bendell Configuring SonicWALL Firewalls
Mason CCNP Security Secure 642-637 Quick Reference
Tabassum et al. Network capability analysis and related implementations improvements recommendations
Myllykangas Integrating Next-Generation Firewalls into a Private Cloud Datacenter
Matei CCNP Security VPN 642-648 Quick Reference
Simone 9, Author retains full rights.