Viegas et al., 2022 - Google Patents
IT security technical controlsViegas et al., 2022
- Document ID
- 18154520530845786402
- Author
- Viegas V
- Kuyucu O
- Publication year
- Publication venue
- IT Security Controls: A Guide to Corporate Standards and Frameworks
External Links
Snippet
This chapter lists and explains the technical security controls that organizations must have to secure their assets. These controls implementation should be based on a zero trust model where all users, whether inside or outside the organization, need to be authenticated and …
- 238000000034 method 0 abstract description 29
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12192173B2 (en) | Network traffic inspection | |
US10958662B1 (en) | Access proxy platform | |
Tabrizchi et al. | A survey on security challenges in cloud computing: issues, threats, and solutions | |
US11843577B2 (en) | Fingerprinting to identify devices and applications for use in management and policy in the cloud | |
US11457040B1 (en) | Reverse TCP/IP stack | |
US11134386B2 (en) | Device identification for management and policy in the cloud | |
US10057282B2 (en) | Detecting and reacting to malicious activity in decrypted application data | |
US9866566B2 (en) | Systems and methods for detecting and reacting to malicious activity in computer networks | |
Kumar et al. | Exploring security issues and solutions in cloud computing services–a survey | |
Rais et al. | Zero Trust Networks: Building Secure Systems in Untrusted Networks | |
Chauhan | Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus | |
Walsh et al. | Intra-cloud and inter-cloud authentication | |
Sailakshmi | Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud | |
Viegas et al. | IT security technical controls | |
Kuzminykh et al. | Mechanisms of ensuring security in Keystone service | |
Todorov et al. | AWS Se urity Best Pra ti es | |
US12294605B2 (en) | Providing identity protection | |
US20250260677A1 (en) | Proxy for Security in Sessions Involving Certificate-Pinned Applications | |
Buecker et al. | Stopping Internet Threats Before They Affect Your Business by Using the IBM Security Network Intrusion Prevention System | |
Parker et al. | Numbers and Symbols | |
CSA et al. | Helix Nebula–The Science Cloud | |
HSM | NEW QUESTION | |
Karouei et al. | US approach to moving toward Zero Trust Cyber Security Principles | |
Gregg | CompTIA Security+ Rapid Review (exam SY0-301) | |
Majumdar | Cloud Computing and Its Security |