Day, 2017 - Google Patents
Security in the Digital World: For the home user, parent, consumer and home officeDay, 2017
- Document ID
- 9568598566358134987
- Author
- Day G
- Publication year
External Links
Snippet
“Love the fact that it jumped in with 10 top tips for security, a great opening to the book… Excellent section on phishing emails/vishing/smishing, with great practical examples…” Christopher Wright, Wright-CandA Consulting Ltd Protect yourself from cyber threats and …
- 230000002633 protecting 0 abstract description 39
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nurse | Cybercrime and you: How criminals attack and the human factors that they seek to exploit | |
Hassan et al. | Open source intelligence methods and tools | |
Liska et al. | Ransomware: Defending against digital extortion | |
Kremling et al. | Cyberspace, cybersecurity, and cybercrime | |
Johnson | Cyber crime, security and digital intelligence | |
Sammons et al. | The basics of cyber safety: computer and mobile device safety made easy | |
Pande | Introduction to cyber security | |
Ozkaya et al. | Hands-On Cybersecurity for Finance: Identify vulnerabilities and secure your financial services from security breaches | |
Varshney et al. | Anti-phishing: A comprehensive perspective | |
Hassan et al. | Digital Privacy and Security Using Windows: A Practical Guide | |
Turban et al. | E-commerce security and fraud issues and protections | |
Kissell | Take control of your online privacy | |
Sabillon | Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM | |
Day | Security in the Digital World: For the home user, parent, consumer and home office | |
Hennig | Privacy and security online: Best practices for cybersecurity | |
McDonough | Cyber smart: Five habits to protect your family, money, and identity from cyber criminals | |
Frumento et al. | The role of Social Engineering in evolution of attacks | |
Ryder et al. | Cyber crisis management: Overcoming the challenges in cyberspace | |
Goutam | Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals (English Edition) | |
Furnell | Computer insecurity: Risking the system | |
Connolly | User privacy: A practical guide for librarians | |
Donaldson et al. | Understanding security issues | |
Roddel | The Ultimate Guide to Internet Safety Second Edition | |
Colorossi | Cyber security | |
Síochána | Cyber Crime |