Amin et al. - Google Patents
Information Assurance in the Era of Mobility: Challenges and SolutionsAmin et al.
- Document ID
- 2254873677738008456
- Author
- Amin M
- Neoaz N
- Publication venue
- BULLET: Jurnal Multidisiplin Ilmu
External Links
Snippet
With more family and organizational members using mobile devices within homes and workplaces, mobile device security particularly in regard to information security is an important question. The information assurance principles, secure mobile technologies …
- 238000005516 engineering process 0 abstract description 54
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/12—Fraud detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rao et al. | The InfoSec handbook: An introduction to information security | |
US8984611B2 (en) | System, apparatus and method for securing electronic data independent of their location | |
JP6543040B2 (en) | System and method for remote access, remote digital signature | |
Vorakulpipat et al. | A policy‐based framework for preserving confidentiality in BYOD environments: a review of information security perspectives | |
Caballero | Information security essentials for information technology managers: Protecting mission-critical systems | |
CN110892691A (en) | Secure execution platform cluster | |
Sudharson et al. | Secure Authentication scheme using CEEK technique for Trusted Environment | |
Bourgeois et al. | Information systems security | |
Sam | BALANCING CYBERSECURITY AFTER THE PANDEMIC (Tips and Tricks) | |
Chowdhury et al. | Threat models over space and time: a case study of E2EE messaging applications | |
Balogun | Cybersecurity in mobile fintech applications: Addressing the unique challenges of securing user data | |
Yuan et al. | Teaching security management for mobile devices | |
Kangwa | Prevention of personally identifiable information leakage in ecommerce using offline data minimization and online pseudonymisation. | |
Dhondge | Lifecycle IoT Security for Engineers | |
Henry et al. | Cloud Computing Security Threats And Solutions | |
Das Chowdhury et al. | Threat models over space and time: A case study of end‐to‐end‐encrypted messaging applications | |
Anand et al. | Data security and privacy-preserving in cloud computing paradigm: Survey and open issues | |
Mirza et al. | Security Analysis of Android Hot Cryptocurrency Wallet Applications | |
Voeller | Cyber security | |
Amin et al. | Information Assurance in the Era of Mobility: Challenges and Solutions | |
Ghazizadeh et al. | Secure openID authentication model by using trusted computing | |
Chakraborti et al. | Application security framework for mobile app development in enterprise setup | |
Mansoor | Intranet Security | |
Haas | Ransomware goes mobile: An analysis of the threats posed by emerging methods | |
Alsop et al. | Innovating Augmented Reality Security: Recent E2E Encryption Approaches |