[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Day, 2017 - Google Patents

Security in the Digital World: For the home user, parent, consumer and home office

Day, 2017

Document ID
9568598566358134987
Author
Day G
Publication year

External Links

Snippet

“Love the fact that it jumped in with 10 top tips for security, a great opening to the book… Excellent section on phishing emails/vishing/smishing, with great practical examples…” Christopher Wright, Wright-CandA Consulting Ltd Protect yourself from cyber threats and …
Continue reading at books.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Similar Documents

Publication Publication Date Title
Nurse Cybercrime and you: How criminals attack and the human factors that they seek to exploit
Hassan et al. Open source intelligence methods and tools
Liska et al. Ransomware: Defending against digital extortion
Kremling et al. Cyberspace, cybersecurity, and cybercrime
Johnson Cyber crime, security and digital intelligence
Sammons et al. The basics of cyber safety: computer and mobile device safety made easy
Pande Introduction to cyber security
Ozkaya et al. Hands-On Cybersecurity for Finance: Identify vulnerabilities and secure your financial services from security breaches
Varshney et al. Anti-phishing: A comprehensive perspective
Hassan et al. Digital Privacy and Security Using Windows: A Practical Guide
Turban et al. E-commerce security and fraud issues and protections
Kissell Take control of your online privacy
Sabillon Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM
Day Security in the Digital World: For the home user, parent, consumer and home office
Hennig Privacy and security online: Best practices for cybersecurity
McDonough Cyber smart: Five habits to protect your family, money, and identity from cyber criminals
Frumento et al. The role of Social Engineering in evolution of attacks
Ryder et al. Cyber crisis management: Overcoming the challenges in cyberspace
Goutam Cybersecurity Fundamentals: Understand the Role of Cybersecurity, Its Importance and Modern Techniques Used by Cybersecurity Professionals (English Edition)
Furnell Computer insecurity: Risking the system
Connolly User privacy: A practical guide for librarians
Donaldson et al. Understanding security issues
Roddel The Ultimate Guide to Internet Safety Second Edition
Colorossi Cyber security
Síochána Cyber Crime