[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Brinkerhoff, 2019 - Google Patents

Nine dangerous myths about identity governance

Brinkerhoff, 2019

Document ID
1259933893833179059
Author
Brinkerhoff J
Publication year
Publication venue
Computer Fraud & Security

External Links

Snippet

We ought to approach the digital revolution with a spirit of optimism and look forward to a future of better, more efficient and insightful business. Yet each week brings a fresh worry about new technology, usually security-related. Stories abound of hacks, botnets, major …
Continue reading at www.magonlinelibrary.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies

Similar Documents

Publication Publication Date Title
Garba et al. Review of the information security and privacy challenges in Bring Your Own Device (BYOD) environments
Younis et al. Secure cloud computing for critical infrastructure: A survey
Bose et al. The roles of security and trust: Comparing cloud computing and banking
Kadam Security issues in cloud computing a transparent view
Mahajan et al. The malicious insiders threat in the cloud
Gibson et al. Vulnerability in massive api scraping: 2021 linkedin data breach
Kraus et al. The impact of servation on the results of economic digital entrepreneurship activities
Eastman et al. Big data and predictive analytics: on the cybersecurity front line
Newcombe Securing Cloud Services: A Pragmatic Approach
Uddin et al. Systematic review of identity access management in information security
Wallang et al. Cyber security in Small and Medium Enterprises (SMEs): What’s good or bad?
Bargavi et al. Data Breach–Its Effects on Industry
Hossain et al. Local Government Cybersecurity Landscape: A Systematic Review and Conceptual Framework
Robinson Insights on cloud security management
Taneja et al. Information Security in cloud computing: A Systematic Literature Review and analysis
Silva Web 3.0 and Cybersecurity–Short Paper
Deshpande et al. Smart secure: a novel risk based maturity model for enterprise risk management during global pandemic
Brinkerhoff Nine dangerous myths about identity governance
Flynn et al. Cloud service provider methods for managing insider threats: Analysis phase ii, expanded analysis and recommendations
Bassett Cloud computing and innovation: Its viability, benefits, challenges and records management capabilities
Koinig et al. Contrology-an ontology-based cloud assurance approach
Malik Making sense of human threats and errors
Kaplan et al. Protecting information in the cloud
Kim et al. Social engineering based security requirements elicitation model for advanced persistent threats
Thamrongthanakit Impacts of Cybersecurity Practices on Cyberattack Damage and Protection Among Small and Medium Enterprises in Thailand