Jaiswal, 2019 - Google Patents
Cybercrime categories and preventionJaiswal, 2019
View PDF- Document ID
- 12856920141824152792
- Author
- Jaiswal D
- Publication year
- Publication venue
- Manishaben Jaiswal," CYBERCRIME CATEGORIES AND PREVENTION", International Journal of Creative Research Thoughts (IJCRT), ISSN
External Links
Snippet
After determining computer system criminal offense within endeavor, experts examine the styles that have been devoted over the last, and the brand new techniques probably to seem down the road. Experts also check the challenge in evaluating and discovering computer …
- 230000002265 prevention 0 title description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rani et al. | Cyber security techniques, architectures, and design | |
US20100313253A1 (en) | Method, system and process for authenticating the sender, source or origin of a desired, authorized or legitimate email or electrinic mail communication | |
Osuagwu et al. | Mitigating social engineering for improved cybersecurity | |
Wadhwa et al. | A Review on Cyber Crime: Major Threats and Solutions. | |
Mubeen et al. | Strategies to Avoid Illegal Data Access | |
Hosam et al. | Security analysis and planning for enterprise networks: Incorporating modern security design principles | |
Bose et al. | Unveiling the mask of phishing: Threats, preventive measures, and responsibilities | |
Jaiswal | Cybercrime categories and prevention | |
Newman | Cybercrime, identity theft, and fraud: practicing safe internet-network security threats and vulnerabilities | |
Choi et al. | Social engineering cyber threats | |
Kumar et al. | A comprehensive study of phishing attacks and their countermeasures | |
Lim et al. | Phishing security: Attack, detection, and prevention mechanisms | |
Awodele et al. | Vulnerabilities in network infrastructures and prevention/containment measures | |
Szmyd et al. | Online identity theft detection and prevention methods | |
Alshammari | Phishing Attacks Cybersecurity. | |
Paquet | Implementing Cisco IOS network security (IINS):(CCNA security exam 640-553)(authorized self-study guide) | |
Ali | Phishing Attacks: Detection and Prevention | |
Chauhan et al. | Social Engineering | |
Kılıç et al. | Security Issues of Remote Work Environments and Alternative Solution Approaches | |
Metwally et al. | Hacking Human: Hacking the Weakest Link in the Security Chain | |
WRÓBEL | 11. Protecting Privacy on the Internet–The Legal Protection of Online Privacy and Prevention | |
Rowell | Cyber indicators of compromise: a domain ontology for security information and event management | |
Burnburg | A proposed framework for business information security based on the concept of defense-in-depth | |
Rani et al. | 3 Cyber Security Techniques | |
Briain | Access Control |