Shukla et al., 2022 - Google Patents
Data securityShukla et al., 2022
- Document ID
- 4648519784893731791
- Author
- Shukla S
- George J
- Tiwari K
- Kureethara J
- Publication year
- Publication venue
- Data Ethics and Challenges
External Links
Snippet
Corporates, industries, and governments have completely digitized their infrastructure, processes, and data or running towards completed digitalization. This data could be text files, different types of databases, accounts, and networks. The data living in the digital …
- 238000000034 method 0 abstract description 33
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shukla et al. | Data security | |
Popoola et al. | Ransomware: Current trend, challenges, and research directions | |
Herrera Montano et al. | Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat | |
National Academies of Sciences et al. | Decrypting the encryption debate: A framework for decision makers | |
Asaad et al. | A Cyber Security Threats, Vulnerability, Challenges and Proposed Solution | |
Butt et al. | Cyber threat ransomware and marketing to networked consumers | |
Taherdoost | E-Business Security and Control | |
Belmabrouk | Cyber criminals and data privacy measures | |
Singh et al. | CYBERSECURITY AND DATA PRIVACY. | |
Miller et al. | Ransomware and Academic International Medicine | |
Hassan et al. | Ransomware overview | |
Betz | An analysis of the relationship between security information technology enhancements and computer security breaches and incidents | |
Hassan et al. | Introduction: Understanding digital forensics | |
Narain | Ransomware-Rising Menace to an Unsuspecting Cyber Audience | |
O’Regan | Computer Crime | |
SOX | This White Paper | |
Schell et al. | HOW US AND CANADIAN UNIVERSITIES AND COLLEGES DEALT WITH MALWARE AND RANSOMWARE ATTACKS IN 2016-2017. | |
Corrigan | Ransomware: a growing epidemic for business | |
Buksov | Characteristics of a successful ransomware attack | |
Yakubdjanovna et al. | Analysis of Information Security Problems in Electronic Management with Possible Solutions | |
Hughbanks | Cybersecurity within the healthcare industry and electronic health records | |
Teymourlouei | Preventative Measures in Cyber & Ransomware Attacks for Home & Small Businesses' Data | |
Branche | Ransomware: An Analysis of the Current and Future Threat Ransomware Presents | |
Reddy et al. | Introduction to cyber forensics | |
McKnight | The evolution of ransomware and breadth of its economic impact |