Nothing Special   »   [go: up one dir, main page]

Panko, 2010 - Google Patents

Corporate computer and network security, 2/e

Panko, 2010

View PDF
Document ID
17277851631138578778
Author
Panko R
Publication year

External Links

Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Investment, e.g. financial instruments, portfolio management or fund management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Similar Documents

Publication Publication Date Title
Panko Corporate computer and network security, 2/e
Pfleeger et al. Analyzing computer security: A threat/vulnerability/countermeasure approach
Jahankhani et al. Cybercrime classification and characteristics
Easttom et al. Computer crime, investigation, and the law
Henry Penetration testing: protecting networks and systems
Bellovin Thinking Security: Stopping Next Year's Hackers
Elliott Botnets: To what extent are they a threat to information security?
Ozkaya et al. Hands-On Cybersecurity for Finance: Identify vulnerabilities and secure your financial services from security breaches
Stewart CompTIA Security+ Review Guide: Exam SY0-601
Priyadarshini Introduction on cybersecurity
Turban et al. E-commerce security and fraud issues and protections
Grimes Ransomware protection playbook
Varshney et al. Anti-phishing: A comprehensive perspective
Sabillon Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM
Chesney Cybersecurity Law, Policy, and Institutions (version 3.1)
Mishra Modern Cybersecurity Strategies for Enterprises: Protect and Secure Your Enterprise Networks, Digital Business Assets, and Endpoint Security with Tested and Proven Methods (English Edition)
Goutam Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals (English Edition)
Wittkop The cybersecurity playbook for modern enterprises: an end-to-end guide to preventing data breaches and cyber attacks
Rai et al. Cyber Security
Akinola et al. Introduction to Cyber-security
Maurushat et al. Artificial intelligence enabled cyber fraud: a detailed look into payment diversion fraud and ransomware
Paquet et al. The business case for network security: advocacy, governance, and ROI
Das Ransomware: Penetration Testing and Contingency Planning
Gregg et al. CEH Certified Ethical Hacker Cert Guide
Reuvid The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity