Akinola et al., 2022 - Google Patents
Introduction to Cyber-securityAkinola et al., 2022
- Document ID
- 11780546200465551911
- Author
- Akinola A
- Afonja A
- Publication year
External Links
Snippet
Digital information and data processing, storage and transmission are already at the core of most modern enterprises and most individuals have significant digital footprints. Computer- based information networks operating in cyber-space (interconnected on the Internet) are at …
- 238000005516 engineering process 0 abstract description 57
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Panko | Corporate computer and network security, 2/e | |
Johnson | Cyber crime, security and digital intelligence | |
Tounsi | What is cyber threat intelligence and how is it evolving? | |
Stewart | CompTIA Security+ Review Guide: Exam SY0-601 | |
Bollinger et al. | Crafting the InfoSec playbook: security monitoring and incident response master plan | |
Ozkaya et al. | Hands-On Cybersecurity for Finance: Identify vulnerabilities and secure your financial services from security breaches | |
Priyadarshini | Introduction on cybersecurity | |
Wilner et al. | On the social science of ransomware: Technology, security, and society | |
Dhayanidhi | Research on IoT threats & implementation of AI/ML to address emerging cybersecurity issues in IoT with cloud computing | |
Möller | Threats and threat intelligence | |
Gupta et al. | Cybersecurity: a self-teaching introduction | |
Thakral et al. | Cybersecurity and ethics for IoT system: A massive analysis | |
Sabillon | Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM | |
Alsmadi | Cyber threat analysis | |
Waheed et al. | Zero-Day Exploits in Cybersecurity: Case Studies and Countermeasure | |
Aswathy et al. | Privacy Breaches through Cyber Vulnerabilities: Critical Issues, Open Challenges, and Possible Countermeasures for the Future | |
Akinola et al. | Introduction to Cyber-security | |
Ryder et al. | Cyber crisis management: Overcoming the challenges in cyberspace | |
Zhang et al. | The Evolution of Integrated Advance Persistent Threat and Its Defense Solutions: A Literature Review | |
Kaushik et al. | Advanced Techniques and Applications of Cybersecurity and Forensics | |
Mack | Cyber security | |
Karie et al. | Leveraging Artificial Intelligence Capabilities for Real-Time Monitoring of Cybersecurity Threats | |
Stoddart | Gaining access: attack and defense methods and legacy systems | |
Shaikh et al. | Exploring recent challenges in cyber security and their solutions | |
Addo et al. | Artificial intelligence for security |