Rehman, 2019 - Google Patents
Cybersecurity arm wrestlingRehman, 2019
View PDF- Document ID
- 15697681379187644516
- Author
- Rehman R
- Publication year
- Publication venue
- Building a modern SOC, Sisargo Pub
External Links
Snippet
This book has been a work-in-progress for quite some time and it looks like it will remain the same. Reason? Cybersecurity is a continuously evolving field and despite continuous efforts by the industry, I have not heard of anybody inventing a silver bullet to address emerging …
- 241000522213 Dichilus lebeckioides 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jaquith | Security metrics | |
Kouns et al. | Information technology risk management in enterprise environments: A review of industry practices and a practical guide to risk management teams | |
Rashid et al. | Economic model for evaluating the value creation through information sharing within the cybersecurity information sharing ecosystem | |
Brotherston et al. | Defensive security handbook | |
Johnson et al. | Security policies and implementation issues | |
Onwubiko et al. | Challenges towards building an effective cyber security operations centre | |
Bobbert et al. | Zero trust validation: from practical approaches to theory | |
Blum et al. | Institute resilience through detection, response, and recovery | |
Gorecki | Cyber breach response that actually works: Organizational approach to managing residual risk | |
Buecker et al. | Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security | |
Rehman | Cybersecurity arm wrestling | |
SERIES | ARM WRESTLING | |
Moore | A Zero Trust Approach to Fundamentally Redesign Network Architecture within Federal Agencies | |
McLaughlin | Cybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy | |
Erdıvan | Process, Technology and Human Aspects of a Security Operations Center | |
Hill et al. | Understanding Threat Hunting Personas | |
Kuypers | Risk in cyber systems | |
Bellasio et al. | Developing Cybersecurity Capacity | |
Copeland et al. | Cloud Defense Strategies with Azure Sentinel | |
Van der Heide | Establishing a CSIRT | |
Feng et al. | SHINE: a Collaborative System for Sharing Insights and Information of Economic Impacts of Cyberattacks | |
McGhee | Information technology governance: An exploratory study of the impact of organizational information technology security planning | |
Hariharan et al. | Basic Tool Kit for Cybersecurity in Education Management Information Systems | |
Desmedt et al. | Information security for Industry 4.0 | |
Agrawal et al. | Exam Ref AZ-304 Microsoft Azure Architect Design |