Nothing Special   »   [go: up one dir, main page]

Akinola et al., 2022 - Google Patents

Introduction to Cyber-security

Akinola et al., 2022

Document ID
11780546200465551911
Author
Akinola A
Afonja A
Publication year

External Links

Snippet

Digital information and data processing, storage and transmission are already at the core of most modern enterprises and most individuals have significant digital footprints. Computer- based information networks operating in cyber-space (interconnected on the Internet) are at …
Continue reading at books.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting

Similar Documents

Publication Publication Date Title
Panko Corporate computer and network security, 2/e
Johnson Cyber crime, security and digital intelligence
Tounsi What is cyber threat intelligence and how is it evolving?
Stewart CompTIA Security+ Review Guide: Exam SY0-601
Bollinger et al. Crafting the InfoSec playbook: security monitoring and incident response master plan
Ozkaya et al. Hands-On Cybersecurity for Finance: Identify vulnerabilities and secure your financial services from security breaches
Priyadarshini Introduction on cybersecurity
Wilner et al. On the social science of ransomware: Technology, security, and society
Dhayanidhi Research on IoT threats & implementation of AI/ML to address emerging cybersecurity issues in IoT with cloud computing
Möller Threats and threat intelligence
Gupta et al. Cybersecurity: a self-teaching introduction
Thakral et al. Cybersecurity and ethics for IoT system: A massive analysis
Sabillon Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM
Alsmadi Cyber threat analysis
Waheed et al. Zero-Day Exploits in Cybersecurity: Case Studies and Countermeasure
Aswathy et al. Privacy Breaches through Cyber Vulnerabilities: Critical Issues, Open Challenges, and Possible Countermeasures for the Future
Akinola et al. Introduction to Cyber-security
Ryder et al. Cyber crisis management: Overcoming the challenges in cyberspace
Zhang et al. The Evolution of Integrated Advance Persistent Threat and Its Defense Solutions: A Literature Review
Kaushik et al. Advanced Techniques and Applications of Cybersecurity and Forensics
Mack Cyber security
Karie et al. Leveraging Artificial Intelligence Capabilities for Real-Time Monitoring of Cybersecurity Threats
Stoddart Gaining access: attack and defense methods and legacy systems
Shaikh et al. Exploring recent challenges in cyber security and their solutions
Addo et al. Artificial intelligence for security