[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Shevchuk et al., 2020 - Google Patents

Software for automatic estimating security settings of social media accounts

Shevchuk et al., 2020

Document ID
1595160667071307311
Author
Shevchuk R
Melnyk A
Opalko O
Shevchuk H
Publication year
Publication venue
2020 10th International Conference on Advanced Computer Information Technologies (ACIT)

External Links

Snippet

Today, many users do not use the security settings provided by social media and are unaware of the risks that come with sharing too much personal information. In this research, security management on social media is considered. The paper discusses and investigates …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect

Similar Documents

Publication Publication Date Title
Chiew et al. A survey of phishing attacks: Their types, vectors and technical approaches
Huang et al. Using one-time passwords to prevent password phishing attacks
Shevchuk et al. Software for automatic estimating security settings of social media accounts
Giani et al. Data exfiltration and covert channels
Kellezi et al. Securing Open Banking with Model‐View‐Controller Architecture and OWASP
Qazi Application Programming Interface (API) Security in Cloud Applications
WO2022271505A1 (en) Systems and methods for dynamic detection of vulnerable credentials
Taraka Rama Mokshagna Teja et al. Prevention of phishing attacks using qr code safe authentication
Vishal et al. SOAiCE: simulation of attacks in cloud computing environment
Osei et al. Cloud computing login authentication redesign
Sam et al. Survey of risks and threats in online learning applications
Dlamini et al. Securing cloud computing’s blind-spots using strong and risk-based MFA
Tundis et al. The role of Information and Communication Technology (ICT) in modern criminal organizations
Grzonkowski et al. D-FOAF-Security aspects in distributed user management system
Liu et al. Account Lockouts: Characterizing and Preventing Account Denial-of-Service Attacks
Sharma et al. Security analysis on social media networks via STRIDE model
Unsel et al. Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example
Raponi et al. A spark is enough in a straw world: A study of websites password management in the wild
Paquet et al. The business case for network security: advocacy, governance, and ROI
Li On Enhancing Security of Password-Based Authentication
Golla et al. " I want my money back!" Limiting Online Password-Guessing Financially.
Kangwa et al. Improved Protection of User Data Through the Use of a Traceable Anonymous One Time Password
Ananya ADDING A TIMER TO CAPTCHA-BASED RGB COLOR AUTHENTICATION
Schmidt et al. Sender scorecards
Valentijn et al. Detection and Detection Evasion with Man-in-the-Middle Phishing