[go: up one dir, main page]

Hafström Fremlin et al., 2023 - Google Patents

Securing Sweden's Digital Assets

Hafström Fremlin et al., 2023

View PDF
Document ID
16852110256871192990
Author
Hafström Fremlin P
Tomic Lindvall D
Publication year

External Links

Snippet

This thesis addresses the gap in literature and research surrounding the historical context of database security in Sweden. Through extensive research and in-depth interviews with Swedish cybersecurity experts, it highlights the underrepresented “story” of database …
Continue reading at lup.lub.lu.se (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Similar Documents

Publication Publication Date Title
Adkins et al. Building secure and reliable systems: best practices for designing, implementing, and maintaining systems
Stuttard et al. The web application hacker's handbook: Finding and exploiting security flaws
Dotson Practical cloud security
Rains Cybersecurity Threats, Malware Trends, and Strategies: Discover risk mitigation strategies for modern threats to your organization
Das A risk-reduction-based incentivization model for human-centered multi-factor authentication
Wheeler et al. Cloud storage security: A practical guide
Aswathy et al. Privacy breaches through cyber vulnerabilities: Critical issues, open challenges, and possible countermeasures for the future
Azem Qashou et al. Qualitative Exploration of Data Security Risks in Mobile Cloud Computing for Higher Education
US12028376B2 (en) Systems and methods for creation, management, and storage of honeyrecords
Lakhe Practical Hadoop Security
Chapple et al. CompTIA Security+ Study Guide with Over 500 Practice Test Questions: Exam SY0-701
Hafström Fremlin et al. Securing Sweden’s Digital Assets
Maleh Web application PenTesting: A comprehensive Guide for professionals
McDonald Grokking Web Application Security
Betz An analysis of the relationship between security information technology enhancements and computer security breaches and incidents
Tytarenko Selection of the best security controls for rapid development of enterprise-level cyber security
Khidzir et al. Guardians of Data: A Comprehensive Guide to Digital Data Protection
Tellenbach et al. Security of data science and data science for security
Williams Cybersecurity: Zero-day vulnerabilities and attack vectors
Gracy A global analysis of data breaches from 2004 to 2024
Zainabi et al. Security risks of chatbots in customer service: a comprehensive literature review
Andress Foundations of Information Security
Díaz de León Guillén et al. A systematic review of security threats and countermeasures in SaaS
Barker Confident Cyber Security: The Essential Insights and How to Protect from Threats
Ofuokwu Strategies for Securing Users’ Personal Data against Security Threats in MCC Networks