[go: up one dir, main page]

Fernandes, 2021 - Google Patents

Data security and privacy in times of pandemic

Fernandes, 2021

View PDF
Document ID
283862306554978879
Author
Fernandes L
Publication year
Publication venue
Proceedings of the digital Privacy and security conference

External Links

Snippet

Our presentis marked with the corona virus appearance, which lead to a worldwide pandemic situation declared by the world health organization. This situation leads to several different measures to prevent the virus from spreading, which includes online classes from …
Continue reading at privacyandsecurityconference.pt (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Amara et al. Cloud computing security threats and attacks with their mitigation techniques
US20250284813A1 (en) Managing permitted browser related risky activity in a secure environment
US10382525B2 (en) Managing transmission and storage of sensitive data
US8826400B2 (en) System for automated prevention of fraud
US8856869B1 (en) Enforcement of same origin policy for sensitive data
Chhikara et al. Phishing & anti-phishing techniques: Case study
US20250097264A1 (en) Mitigating phishing attempts
Hutchings et al. Cloud computing for small business: Criminal and security threats and prevention measures
Fernandes Data security and privacy in times of pandemic
Haber et al. Attack vectors
Nelson et al. Social engineering for security attacks
Lepofsky The manager's guide to web application security: a concise guide to the weaker side of the web
Odirichukwu et al. Security concept in web database development and administration—A review perspective
Khandelwal et al. Frontline techniques to prevent web application vulnerability
Kakareka What is vulnerability assessment?
Krasniqi et al. Vulnerability Assessment & Penetration Testing: Case study on web application security
Campbell Protection of systems
Rao et al. A Three-Pronged Approach to Mitigate Web Attacks
Robles et al. Survey of non-malicious user actions that introduce network and system vulnerabilities and exploits
Dhule et al. Analysis and Survey on Cybersecurity: Threats and Solutions
Nair et al. Cyber Attacks and its Prevention Techniques
Kamal et al. Security and Privacy Issues in Wireless Networks and Mitigation Methods
Sayibu et al. Delivering a Secured Cloud Computing Architecture and Traditional IT Outsourcing Environment via Penetration Tools in Ghana
De Ryck Client-side web security: mitigating threats against web sessions
Imanova et al. Cyberattacks and social media account security