Nothing Special   »   [go: up one dir, main page]

Waxler, 2018 - Google Patents

Prioritizing Security Controls Using Multiple Criteria Decision Making for Home Users

Waxler, 2018

View HTML
Document ID
8543968411652546485
Author
Waxler J
Publication year

External Links

Snippet

Hundreds of thousands of home users are victimized by cyber-attacks every year. Many experts agree that average home users are not doing enough to protect their home computers from cyber-attacks. Improperly managed home computers can lead to individuals …
Continue reading at search.proquest.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Ani et al. Human factor security: evaluating the cybersecurity capacity of the industrial workforce
Guo et al. Understanding nonmalicious security violations in the workplace: A composite behavior model
Stewart et al. CISSP: Certified information systems security professional study guide
Ncubukezi Human errors: A cybersecurity concern and the weakest link to small businesses
Krause Information Security Management Handbook on CD-ROM
Gunter et al. Experience-based access management: A life-cycle framework for identity and access management systems
Nilsen Measuring cybersecurity competency: An exploratory investigation of the cybersecurity knowledge, skills, and abilities necessary for organizational network access privileges
Crawford et al. Gaps in United States federal government IoT security and privacy policies
Wald Legal Ethics' Next Frontier: Lawyers and Cybersecurity
Chapple Access control and identity management
Waxler Prioritizing Security Controls Using Multiple Criteria Decision Making for Home Users
Adane Development of advisory knowledge-based expert system to identify and mitigate unintentional insider threats in financial institutions of Ethiopia
Parsons et al. How secure is home: Assessing human susceptibility to IoT threats
Wynn Examining the relationship of business operations and the information security culture in the United States
Ryan A comparison of information security trends between formal and informal environments
Scala et al. A model for and inventory of cybersecurity values: metrics and best practices
Dorrington Future insider threats: A Delphi analysis
Herrin et al. Employee and insider data breaches: Vulnerability or threat vector
Stewart The Community Defense Approach: A Human Approach to Cybersecurity for Industrial and Manufacturing Systems
AlNaaji Automating unauthorized access attempts detection and handling using robotic process automation
Santee An exploratory study of the approach to bring your own device (BYOD) in assuring information security
Stephens Understanding security compliant behavior: A case study
Krutz et al. The CISSP prep guide: mastering the CISSP and ISSEP exams
Dennehy Preventing Insider Cyberthreats in Organizations: A Qualitative Delphi Study
Kendall The Openness of Higher Education and Implications on Cybersecurity