Opatrny et al., 2012 - Google Patents
Virtual Private Networks and Secure Remote AccessOpatrny et al., 2012
- Document ID
- 15128826144044361904
- Author
- Opatrny J
- Ness C
- Publication year
- Publication venue
- Computer Security Handbook
External Links
Snippet
This chapter provides an introduction to different types of virtual private networks (VPNs) and extranets and their uses. VPNs and extranets have many powerful features that can enhance an organizations ability to conduct and improve employee mobility and business …
- 230000002708 enhancing 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11120125B2 (en) | Configurable internet isolation and security for laptops and similar devices | |
US12034854B2 (en) | Providing single sign-on (SSO) in disjoint networks with non-overlapping authentication protocols | |
US10728246B2 (en) | Service driven split tunneling of mobile network traffic | |
US20210336934A1 (en) | Cloud-based web application and API protection | |
US11170096B2 (en) | Configurable internet isolation and security for mobile devices | |
US10931669B2 (en) | Endpoint protection and authentication | |
Jakimoski | Security techniques for data protection in cloud computing | |
US20230247003A1 (en) | Zero trust private application access for government applications | |
US10417428B2 (en) | Methods and systems for providing and controlling cryptographic secure communications terminal providing a remote desktop accessible in secured and unsecured environments | |
US11552987B2 (en) | Systems and methods for command and control protection | |
US20220329585A1 (en) | Utilizing endpoint security posture, identification, and remote attestation for restricting private application access | |
US20220353244A1 (en) | Privileged remote access for OT/IOT/IIOT/ICS infrastructure | |
US20180375841A1 (en) | Systems and methods for enterprise communications | |
US20230019448A1 (en) | Predefined signatures for inspecting private application access | |
Bui et al. | Client-side vulnerabilities in commercial vpns | |
US20230015603A1 (en) | Maintaining dependencies in a set of rules for security scanning | |
US20230231884A1 (en) | Browser fingerprinting and control for session protection and private application protection | |
Nyakomitta et al. | Security investigation on remote access methods of virtual private network | |
Salah et al. | Analyzing the security of Windows 7 and Linux for cloud computing | |
Chauhan | Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus | |
US20240129321A1 (en) | Zero Trust System Architecture | |
Frankel et al. | Guide to ssl vpns | |
Seneviratne et al. | Integrated Corporate Network Service Architecture for Bring Your Own Device (BYOD) Policy | |
Brooks et al. | Conceptualizing a secure wireless cloud | |
Opatrny et al. | Virtual Private Networks and Secure Remote Access |