Panko, 2010 - Google Patents
Corporate computer and network security, 2/ePanko, 2010
View PDF- Document ID
- 17277851631138578778
- Author
- Panko R
- Publication year
External Links
- 239000007787 solid 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/06—Investment, e.g. financial instruments, portfolio management or fund management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Panko | Corporate computer and network security, 2/e | |
Pfleeger et al. | Analyzing computer security: A threat/vulnerability/countermeasure approach | |
Jahankhani et al. | Cybercrime classification and characteristics | |
Easttom et al. | Computer crime, investigation, and the law | |
Henry | Penetration testing: protecting networks and systems | |
Bellovin | Thinking Security: Stopping Next Year's Hackers | |
Elliott | Botnets: To what extent are they a threat to information security? | |
Ozkaya et al. | Hands-On Cybersecurity for Finance: Identify vulnerabilities and secure your financial services from security breaches | |
Stewart | CompTIA Security+ Review Guide: Exam SY0-601 | |
Priyadarshini | Introduction on cybersecurity | |
Turban et al. | E-commerce security and fraud issues and protections | |
Grimes | Ransomware protection playbook | |
Varshney et al. | Anti-phishing: A comprehensive perspective | |
Sabillon | Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM | |
Chesney | Cybersecurity Law, Policy, and Institutions (version 3.1) | |
Mishra | Modern Cybersecurity Strategies for Enterprises: Protect and Secure Your Enterprise Networks, Digital Business Assets, and Endpoint Security with Tested and Proven Methods (English Edition) | |
Goutam | Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals (English Edition) | |
Wittkop | The cybersecurity playbook for modern enterprises: an end-to-end guide to preventing data breaches and cyber attacks | |
Rai et al. | Cyber Security | |
Akinola et al. | Introduction to Cyber-security | |
Maurushat et al. | Artificial intelligence enabled cyber fraud: a detailed look into payment diversion fraud and ransomware | |
Paquet et al. | The business case for network security: advocacy, governance, and ROI | |
Das | Ransomware: Penetration Testing and Contingency Planning | |
Gregg et al. | CEH Certified Ethical Hacker Cert Guide | |
Reuvid | The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity |