[go: up one dir, main page]

Jaiswal, 2019 - Google Patents

Cybercrime categories and prevention

Jaiswal, 2019

View PDF
Document ID
12856920141824152792
Author
Jaiswal D
Publication year
Publication venue
Manishaben Jaiswal," CYBERCRIME CATEGORIES AND PREVENTION", International Journal of Creative Research Thoughts (IJCRT), ISSN

External Links

Snippet

After determining computer system criminal offense within endeavor, experts examine the styles that have been devoted over the last, and the brand new techniques probably to seem down the road. Experts also check the challenge in evaluating and discovering computer …
Continue reading at papers.ssrn.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Similar Documents

Publication Publication Date Title
Rani et al. Cyber security techniques, architectures, and design
US20100313253A1 (en) Method, system and process for authenticating the sender, source or origin of a desired, authorized or legitimate email or electrinic mail communication
Osuagwu et al. Mitigating social engineering for improved cybersecurity
Wadhwa et al. A Review on Cyber Crime: Major Threats and Solutions.
Mubeen et al. Strategies to Avoid Illegal Data Access
Hosam et al. Security analysis and planning for enterprise networks: Incorporating modern security design principles
Bose et al. Unveiling the mask of phishing: Threats, preventive measures, and responsibilities
Jaiswal Cybercrime categories and prevention
Newman Cybercrime, identity theft, and fraud: practicing safe internet-network security threats and vulnerabilities
Choi et al. Social engineering cyber threats
Kumar et al. A comprehensive study of phishing attacks and their countermeasures
Lim et al. Phishing security: Attack, detection, and prevention mechanisms
Awodele et al. Vulnerabilities in network infrastructures and prevention/containment measures
Szmyd et al. Online identity theft detection and prevention methods
Alshammari Phishing Attacks Cybersecurity.
Paquet Implementing Cisco IOS network security (IINS):(CCNA security exam 640-553)(authorized self-study guide)
Ali Phishing Attacks: Detection and Prevention
Chauhan et al. Social Engineering
Kılıç et al. Security Issues of Remote Work Environments and Alternative Solution Approaches
Metwally et al. Hacking Human: Hacking the Weakest Link in the Security Chain
WRÓBEL 11. Protecting Privacy on the Internet–The Legal Protection of Online Privacy and Prevention
Rowell Cyber indicators of compromise: a domain ontology for security information and event management
Burnburg A proposed framework for business information security based on the concept of defense-in-depth
Rani et al. 3 Cyber Security Techniques
Briain Access Control