Firesmith, 2003 - Google Patents
Analyzing and specifying reusable security requirementsFiresmith, 2003
View PDF- Document ID
- 17755288386453764549
- Author
- Firesmith D
- Publication year
External Links
Snippet
A system cannot have high assurance if it has poor security, and thus, requirements for high assurance systems will logically include security requirements as well as availability, reliability, and robustness requirements. Unlike typical functional requirements, security …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Firesmith | Analyzing and specifying reusable security requirements | |
Nieles et al. | An introduction to information security | |
Matulevičius | Fundamentals of secure system modelling | |
Silowash et al. | Common sense guide to mitigating insider threats | |
Zafar et al. | Current state of information security research in IS | |
Gollman | Computer security | |
US20100325097A1 (en) | Non-Invasive Usage Tracking, Access Control, Policy Enforcement, Audit Logging, and User Action Automation On Software Applications | |
CISM et al. | Business continuity and disaster recovery for infosec managers | |
Silowash et al. | Common sense guide to mitigating insider threats 4th edition | |
Paul | Official (ISC) 2 Guide to the CSSLP | |
Al Qartah | Evolving ransomware attacks on healthcare providers | |
Beissel | Cybersecurity investments: Decision support under economic aspects | |
CISM et al. | Wireless operational security | |
Massingale et al. | Risk Allocation for Computer System Security Breaches: Potential Liability for Providers of Computer Services | |
Collins et al. | Spotlight On: Programmers as Malicious Insiders--Updated and Revised | |
Al-Shorafat | Security in software engineering requirement | |
Gamble | The Cybersecurity Maturity Model Certification (CMMC)–A pocket guide | |
Baars et al. | Foundations of information security based on ISO27001 and ISO27002 | |
IBRAHIM | Cybersecurity: Panorama and Implementation in 2021 | |
Schaeffer et al. | Cyber Crime And Cyber Security: A White Paper For Franchisors, Licensors, and Others | |
Khidzir et al. | Guardians of Data: A Comprehensive Guide to Digital Data Protection | |
Seshadri | Literature based Cyber Security Topics: Handbook | |
Gordon | Practical Data Security | |
White | Threat assessment of cyber attacks on retail and financial organizations | |
Boczko | Risk Exposure, Fraud, Cyber Terrorism, and Computer Crime |