Waxler, 2018 - Google Patents
Prioritizing Security Controls Using Multiple Criteria Decision Making for Home UsersWaxler, 2018
View HTML- Document ID
- 8543968411652546485
- Author
- Waxler J
- Publication year
External Links
Snippet
Hundreds of thousands of home users are victimized by cyber-attacks every year. Many experts agree that average home users are not doing enough to protect their home computers from cyber-attacks. Improperly managed home computers can lead to individuals …
- 238000000034 method 0 abstract description 127
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ani et al. | Human factor security: evaluating the cybersecurity capacity of the industrial workforce | |
Guo et al. | Understanding nonmalicious security violations in the workplace: A composite behavior model | |
Stewart et al. | CISSP: Certified information systems security professional study guide | |
Ncubukezi | Human errors: A cybersecurity concern and the weakest link to small businesses | |
Krause | Information Security Management Handbook on CD-ROM | |
Gunter et al. | Experience-based access management: A life-cycle framework for identity and access management systems | |
Nilsen | Measuring cybersecurity competency: An exploratory investigation of the cybersecurity knowledge, skills, and abilities necessary for organizational network access privileges | |
Crawford et al. | Gaps in United States federal government IoT security and privacy policies | |
Wald | Legal Ethics' Next Frontier: Lawyers and Cybersecurity | |
Chapple | Access control and identity management | |
Waxler | Prioritizing Security Controls Using Multiple Criteria Decision Making for Home Users | |
Adane | Development of advisory knowledge-based expert system to identify and mitigate unintentional insider threats in financial institutions of Ethiopia | |
Parsons et al. | How secure is home: Assessing human susceptibility to IoT threats | |
Wynn | Examining the relationship of business operations and the information security culture in the United States | |
Ryan | A comparison of information security trends between formal and informal environments | |
Scala et al. | A model for and inventory of cybersecurity values: metrics and best practices | |
Dorrington | Future insider threats: A Delphi analysis | |
Herrin et al. | Employee and insider data breaches: Vulnerability or threat vector | |
Stewart | The Community Defense Approach: A Human Approach to Cybersecurity for Industrial and Manufacturing Systems | |
AlNaaji | Automating unauthorized access attempts detection and handling using robotic process automation | |
Santee | An exploratory study of the approach to bring your own device (BYOD) in assuring information security | |
Stephens | Understanding security compliant behavior: A case study | |
Krutz et al. | The CISSP prep guide: mastering the CISSP and ISSEP exams | |
Dennehy | Preventing Insider Cyberthreats in Organizations: A Qualitative Delphi Study | |
Kendall | The Openness of Higher Education and Implications on Cybersecurity |