[go: up one dir, main page]

Viegas et al., 2022 - Google Patents

IT security technical controls

Viegas et al., 2022

Document ID
18154520530845786402
Author
Viegas V
Kuyucu O
Publication year
Publication venue
IT Security Controls: A Guide to Corporate Standards and Frameworks

External Links

Snippet

This chapter lists and explains the technical security controls that organizations must have to secure their assets. These controls implementation should be based on a zero trust model where all users, whether inside or outside the organization, need to be authenticated and …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Similar Documents

Publication Publication Date Title
US12192173B2 (en) Network traffic inspection
US10958662B1 (en) Access proxy platform
Tabrizchi et al. A survey on security challenges in cloud computing: issues, threats, and solutions
US11843577B2 (en) Fingerprinting to identify devices and applications for use in management and policy in the cloud
US11457040B1 (en) Reverse TCP/IP stack
US11134386B2 (en) Device identification for management and policy in the cloud
US10057282B2 (en) Detecting and reacting to malicious activity in decrypted application data
US9866566B2 (en) Systems and methods for detecting and reacting to malicious activity in computer networks
Kumar et al. Exploring security issues and solutions in cloud computing services–a survey
Rais et al. Zero Trust Networks: Building Secure Systems in Untrusted Networks
Chauhan Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus
Walsh et al. Intra-cloud and inter-cloud authentication
Sailakshmi Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud
Viegas et al. IT security technical controls
Kuzminykh et al. Mechanisms of ensuring security in Keystone service
Todorov et al. AWS Se urity Best Pra ti es
US12294605B2 (en) Providing identity protection
US20250260677A1 (en) Proxy for Security in Sessions Involving Certificate-Pinned Applications
Buecker et al. Stopping Internet Threats Before They Affect Your Business by Using the IBM Security Network Intrusion Prevention System
Parker et al. Numbers and Symbols
CSA et al. Helix Nebula–The Science Cloud
HSM NEW QUESTION
Karouei et al. US approach to moving toward Zero Trust Cyber Security Principles
Gregg CompTIA Security+ Rapid Review (exam SY0-301)
Majumdar Cloud Computing and Its Security