[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Rehman, 2019 - Google Patents

Cybersecurity arm wrestling

Rehman, 2019

View PDF
Document ID
15697681379187644516
Author
Rehman R
Publication year
Publication venue
Building a modern SOC, Sisargo Pub

External Links

Snippet

This book has been a work-in-progress for quite some time and it looks like it will remain the same. Reason? Cybersecurity is a continuously evolving field and despite continuous efforts by the industry, I have not heard of anybody inventing a silver bullet to address emerging …
Continue reading at rafeeqrehman.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries

Similar Documents

Publication Publication Date Title
Jaquith Security metrics
Kouns et al. Information technology risk management in enterprise environments: A review of industry practices and a practical guide to risk management teams
Rashid et al. Economic model for evaluating the value creation through information sharing within the cybersecurity information sharing ecosystem
Brotherston et al. Defensive security handbook
Johnson et al. Security policies and implementation issues
Onwubiko et al. Challenges towards building an effective cyber security operations centre
Bobbert et al. Zero trust validation: from practical approaches to theory
Blum et al. Institute resilience through detection, response, and recovery
Gorecki Cyber breach response that actually works: Organizational approach to managing residual risk
Buecker et al. Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
Rehman Cybersecurity arm wrestling
SERIES ARM WRESTLING
Moore A Zero Trust Approach to Fundamentally Redesign Network Architecture within Federal Agencies
McLaughlin Cybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy
Erdıvan Process, Technology and Human Aspects of a Security Operations Center
Hill et al. Understanding Threat Hunting Personas
Kuypers Risk in cyber systems
Bellasio et al. Developing Cybersecurity Capacity
Copeland et al. Cloud Defense Strategies with Azure Sentinel
Van der Heide Establishing a CSIRT
Feng et al. SHINE: a Collaborative System for Sharing Insights and Information of Economic Impacts of Cyberattacks
McGhee Information technology governance: An exploratory study of the impact of organizational information technology security planning
Hariharan et al. Basic Tool Kit for Cybersecurity in Education Management Information Systems
Desmedt et al. Information security for Industry 4.0
Agrawal et al. Exam Ref AZ-304 Microsoft Azure Architect Design