[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Sigler et al., 2016 - Google Patents

Securing an IT organization through governance, risk management, and audit

Sigler et al., 2016

Document ID
7623193562975360420
Author
Sigler K
Rainey III J
Publication year

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction

Similar Documents

Publication Publication Date Title
Silowash et al. Common sense guide to mitigating insider threats
Schumacher et al. Security Patterns: Integrating security and systems engineering
CISSP Official (ISC) 2 guide to the CISSP CBK
Goodenough et al. Toward a theory of assurance case confidence
Johnson et al. Security policies and implementation issues
Conner et al. Information security governance: a call to action
Silowash et al. Common sense guide to mitigating insider threats 4th edition
Andress et al. Building a practical information security program
Kohnke et al. Implementing cybersecurity: A guide to the national institute of standards and technology risk management framework
Kohnke et al. The complete guide to cybersecurity risks and controls
Brumfield Cybersecurity risk management: Mastering the fundamentals using the NIST cybersecurity framework
Da Veiga Cultivating and assessing information security culture
Mead et al. Software assurance curriculum project volume I: Master of software assurance reference curriculum
Sigler et al. Securing an IT organization through governance, risk management, and audit
Axelrod et al. Enterprise information security and privacy
Davis Auditing Information and Cyber Security Governance: A Controls-based Approach
Carlson How to Manage Cybersecurity Risk: A Security Leader's Roadmap with Open FAIR
Workman Information security management
Braithwaite Securing e-business systems: A guide for managers and executives
Yeo Unintentional insider threat assessment framework: Examining the human security indicators in healthcare cybersecurity
Presley Effective Cybersecurity Risk Management in Projects
Abdulrahim Managing Cybersecurity as a Business Risk in Information Technology-based Smes
Bellasio et al. Developing Cybersecurity Capacity
Furrer Principles for Security
Hidalgo Implementing Cybersecurity Measures in New Information Technology Systems: A Generic Qualitative Inquiry