Nothing Special   »   [go: up one dir, main page]

Le Grand et al., 2008 - Google Patents

Database access, security, and auditing for PCI compliance

Le Grand et al., 2008

Document ID
15645261788542008251
Author
Le Grand C
Sarel D
Publication year
Publication venue
EDPAC: The EDP Audit, Control, and Security Newsletter

External Links

Snippet

Now eight years into the aught decade, we ought to be proficient with the controls, monitoring, risk management, and governance needed to prevent and detect the debacles that ushered in the Sarbanes Oxley act of 2002. And we should have a pretty good idea how …
Continue reading at www.tandfonline.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Similar Documents

Publication Publication Date Title
Jansen et al. Guidelines on security and privacy in public cloud computing
Death Information security handbook: develop a threat model and incident response strategy to build a strong information security framework
Jansen et al. Sp 800-144. guidelines on security and privacy in public cloud computing
Stankov et al. Vulnerability and protection of business management systems: threats and challenges
Paul Official (ISC) 2 Guide to the CSSLP
Authority Cyber security framework
Reddy Data breaches in healthcare security systems
Alouane et al. Security, privacy and trust in cloud computing: A comparative study
Harsch et al. Assuming a state of compromise: A best practise approach for SMEs on incident response management
Parker Healthcare regulations, threats, and their impact on cybersecurity
Yuhanna et al. Your enterprise database security strategy 2010
Le Grand et al. Database access, security, and auditing for PCI compliance
Honan ISO27001 in a Windows Environment: The best practice handbook for a Microsoft Windows environment
Hon Attack and defence
Hood Streamlined Cybersecurity: Investigation of the Center for Internet Security (CIS) Controls and Comparison to US Federal Controls
Scott Comparing Cybercrime in Banking and Healthcare Sectors
Battleground Management Information Systems: Managing the Digital Firm
Onsando Digital Lending and Information System Security in Kenya
Osaji Cybersecurity Framework Report
Gelbstein Protecting critical information infrastructures
Seaman et al. Proactive Defense
Badaghaish et al. Evaluating the Effectiveness of Database Security Processes and Methodologies
Blake Network and database security: Regulatory compliance, network, and database security-a unified process and goal
ZURLO et al. Cybersecurity Primer for Local Government Leaders
Tovkun Personal data protection in context of cyberwarfare