[go: up one dir, main page]

Amin et al. - Google Patents

Information Assurance in the Era of Mobility: Challenges and Solutions

Amin et al.

Document ID
2254873677738008456
Author
Amin M
Neoaz N
Publication venue
BULLET: Jurnal Multidisiplin Ilmu

External Links

Snippet

With more family and organizational members using mobile devices within homes and workplaces, mobile device security particularly in regard to information security is an important question. The information assurance principles, secure mobile technologies …
Continue reading at www.neliti.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/12Fraud detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use

Similar Documents

Publication Publication Date Title
Rao et al. The InfoSec handbook: An introduction to information security
US8984611B2 (en) System, apparatus and method for securing electronic data independent of their location
JP6543040B2 (en) System and method for remote access, remote digital signature
Vorakulpipat et al. A policy‐based framework for preserving confidentiality in BYOD environments: a review of information security perspectives
Caballero Information security essentials for information technology managers: Protecting mission-critical systems
CN110892691A (en) Secure execution platform cluster
Sudharson et al. Secure Authentication scheme using CEEK technique for Trusted Environment
Bourgeois et al. Information systems security
Sam BALANCING CYBERSECURITY AFTER THE PANDEMIC (Tips and Tricks)
Chowdhury et al. Threat models over space and time: a case study of E2EE messaging applications
Balogun Cybersecurity in mobile fintech applications: Addressing the unique challenges of securing user data
Yuan et al. Teaching security management for mobile devices
Kangwa Prevention of personally identifiable information leakage in ecommerce using offline data minimization and online pseudonymisation.
Dhondge Lifecycle IoT Security for Engineers
Henry et al. Cloud Computing Security Threats And Solutions
Das Chowdhury et al. Threat models over space and time: A case study of end‐to‐end‐encrypted messaging applications
Anand et al. Data security and privacy-preserving in cloud computing paradigm: Survey and open issues
Mirza et al. Security Analysis of Android Hot Cryptocurrency Wallet Applications
Voeller Cyber security
Amin et al. Information Assurance in the Era of Mobility: Challenges and Solutions
Ghazizadeh et al. Secure openID authentication model by using trusted computing
Chakraborti et al. Application security framework for mobile app development in enterprise setup
Mansoor Intranet Security
Haas Ransomware goes mobile: An analysis of the threats posed by emerging methods
Alsop et al. Innovating Augmented Reality Security: Recent E2E Encryption Approaches