Nothing Special   »   [go: up one dir, main page]

Opatrny et al., 2012 - Google Patents

Virtual Private Networks and Secure Remote Access

Opatrny et al., 2012

Document ID
15128826144044361904
Author
Opatrny J
Ness C
Publication year
Publication venue
Computer Security Handbook

External Links

Snippet

This chapter provides an introduction to different types of virtual private networks (VPNs) and extranets and their uses. VPNs and extranets have many powerful features that can enhance an organizations ability to conduct and improve employee mobility and business …
Continue reading at onlinelibrary.wiley.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Similar Documents

Publication Publication Date Title
US11120125B2 (en) Configurable internet isolation and security for laptops and similar devices
US12034854B2 (en) Providing single sign-on (SSO) in disjoint networks with non-overlapping authentication protocols
US10728246B2 (en) Service driven split tunneling of mobile network traffic
US20210336934A1 (en) Cloud-based web application and API protection
US11170096B2 (en) Configurable internet isolation and security for mobile devices
US10931669B2 (en) Endpoint protection and authentication
Jakimoski Security techniques for data protection in cloud computing
US20230247003A1 (en) Zero trust private application access for government applications
US10417428B2 (en) Methods and systems for providing and controlling cryptographic secure communications terminal providing a remote desktop accessible in secured and unsecured environments
US11552987B2 (en) Systems and methods for command and control protection
US20220329585A1 (en) Utilizing endpoint security posture, identification, and remote attestation for restricting private application access
US20220353244A1 (en) Privileged remote access for OT/IOT/IIOT/ICS infrastructure
US20180375841A1 (en) Systems and methods for enterprise communications
US20230019448A1 (en) Predefined signatures for inspecting private application access
Bui et al. Client-side vulnerabilities in commercial vpns
US20230015603A1 (en) Maintaining dependencies in a set of rules for security scanning
US20230231884A1 (en) Browser fingerprinting and control for session protection and private application protection
Nyakomitta et al. Security investigation on remote access methods of virtual private network
Salah et al. Analyzing the security of Windows 7 and Linux for cloud computing
Chauhan Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus
US20240129321A1 (en) Zero Trust System Architecture
Frankel et al. Guide to ssl vpns
Seneviratne et al. Integrated Corporate Network Service Architecture for Bring Your Own Device (BYOD) Policy
Brooks et al. Conceptualizing a secure wireless cloud
Opatrny et al. Virtual Private Networks and Secure Remote Access