Le Grand et al., 2008 - Google Patents
Database access, security, and auditing for PCI complianceLe Grand et al., 2008
- Document ID
- 15645261788542008251
- Author
- Le Grand C
- Sarel D
- Publication year
- Publication venue
- EDPAC: The EDP Audit, Control, and Security Newsletter
External Links
Snippet
Now eight years into the aught decade, we ought to be proficient with the controls, monitoring, risk management, and governance needed to prevent and detect the debacles that ushered in the Sarbanes Oxley act of 2002. And we should have a pretty good idea how …
- 230000002633 protecting 0 abstract description 26
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jansen et al. | Guidelines on security and privacy in public cloud computing | |
Death | Information security handbook: develop a threat model and incident response strategy to build a strong information security framework | |
Jansen et al. | Sp 800-144. guidelines on security and privacy in public cloud computing | |
Stankov et al. | Vulnerability and protection of business management systems: threats and challenges | |
Paul | Official (ISC) 2 Guide to the CSSLP | |
Authority | Cyber security framework | |
Reddy | Data breaches in healthcare security systems | |
Alouane et al. | Security, privacy and trust in cloud computing: A comparative study | |
Harsch et al. | Assuming a state of compromise: A best practise approach for SMEs on incident response management | |
Parker | Healthcare regulations, threats, and their impact on cybersecurity | |
Yuhanna et al. | Your enterprise database security strategy 2010 | |
Le Grand et al. | Database access, security, and auditing for PCI compliance | |
Honan | ISO27001 in a Windows Environment: The best practice handbook for a Microsoft Windows environment | |
Hon | Attack and defence | |
Hood | Streamlined Cybersecurity: Investigation of the Center for Internet Security (CIS) Controls and Comparison to US Federal Controls | |
Scott | Comparing Cybercrime in Banking and Healthcare Sectors | |
Battleground | Management Information Systems: Managing the Digital Firm | |
Onsando | Digital Lending and Information System Security in Kenya | |
Osaji | Cybersecurity Framework Report | |
Gelbstein | Protecting critical information infrastructures | |
Seaman et al. | Proactive Defense | |
Badaghaish et al. | Evaluating the Effectiveness of Database Security Processes and Methodologies | |
Blake | Network and database security: Regulatory compliance, network, and database security-a unified process and goal | |
ZURLO et al. | Cybersecurity Primer for Local Government Leaders | |
Tovkun | Personal data protection in context of cyberwarfare |