Brinkerhoff, 2019 - Google Patents
Nine dangerous myths about identity governanceBrinkerhoff, 2019
- Document ID
- 1259933893833179059
- Author
- Brinkerhoff J
- Publication year
- Publication venue
- Computer Fraud & Security
External Links
Snippet
We ought to approach the digital revolution with a spirit of optimism and look forward to a future of better, more efficient and insightful business. Yet each week brings a fresh worry about new technology, usually security-related. Stories abound of hacks, botnets, major …
- 238000005516 engineering process 0 abstract description 5
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Garba et al. | Review of the information security and privacy challenges in Bring Your Own Device (BYOD) environments | |
Younis et al. | Secure cloud computing for critical infrastructure: A survey | |
Bose et al. | The roles of security and trust: Comparing cloud computing and banking | |
Kadam | Security issues in cloud computing a transparent view | |
Mahajan et al. | The malicious insiders threat in the cloud | |
Gibson et al. | Vulnerability in massive api scraping: 2021 linkedin data breach | |
Kraus et al. | The impact of servation on the results of economic digital entrepreneurship activities | |
Eastman et al. | Big data and predictive analytics: on the cybersecurity front line | |
Newcombe | Securing Cloud Services: A Pragmatic Approach | |
Uddin et al. | Systematic review of identity access management in information security | |
Wallang et al. | Cyber security in Small and Medium Enterprises (SMEs): What’s good or bad? | |
Bargavi et al. | Data Breach–Its Effects on Industry | |
Hossain et al. | Local Government Cybersecurity Landscape: A Systematic Review and Conceptual Framework | |
Robinson | Insights on cloud security management | |
Taneja et al. | Information Security in cloud computing: A Systematic Literature Review and analysis | |
Silva | Web 3.0 and Cybersecurity–Short Paper | |
Deshpande et al. | Smart secure: a novel risk based maturity model for enterprise risk management during global pandemic | |
Brinkerhoff | Nine dangerous myths about identity governance | |
Flynn et al. | Cloud service provider methods for managing insider threats: Analysis phase ii, expanded analysis and recommendations | |
Bassett | Cloud computing and innovation: Its viability, benefits, challenges and records management capabilities | |
Koinig et al. | Contrology-an ontology-based cloud assurance approach | |
Malik | Making sense of human threats and errors | |
Kaplan et al. | Protecting information in the cloud | |
Kim et al. | Social engineering based security requirements elicitation model for advanced persistent threats | |
Thamrongthanakit | Impacts of Cybersecurity Practices on Cyberattack Damage and Protection Among Small and Medium Enterprises in Thailand |