Shevchuk et al., 2020 - Google Patents
Software for automatic estimating security settings of social media accountsShevchuk et al., 2020
- Document ID
- 1595160667071307311
- Author
- Shevchuk R
- Melnyk A
- Opalko O
- Shevchuk H
- Publication year
- Publication venue
- 2020 10th International Conference on Advanced Computer Information Technologies (ACIT)
External Links
Snippet
Today, many users do not use the security settings provided by social media and are unaware of the risks that come with sharing too much personal information. In this research, security management on social media is considered. The paper discusses and investigates …
- 230000000737 periodic 0 description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chiew et al. | A survey of phishing attacks: Their types, vectors and technical approaches | |
Huang et al. | Using one-time passwords to prevent password phishing attacks | |
Shevchuk et al. | Software for automatic estimating security settings of social media accounts | |
Giani et al. | Data exfiltration and covert channels | |
Kellezi et al. | Securing Open Banking with Model‐View‐Controller Architecture and OWASP | |
Qazi | Application Programming Interface (API) Security in Cloud Applications | |
WO2022271505A1 (en) | Systems and methods for dynamic detection of vulnerable credentials | |
Taraka Rama Mokshagna Teja et al. | Prevention of phishing attacks using qr code safe authentication | |
Vishal et al. | SOAiCE: simulation of attacks in cloud computing environment | |
Osei et al. | Cloud computing login authentication redesign | |
Sam et al. | Survey of risks and threats in online learning applications | |
Dlamini et al. | Securing cloud computing’s blind-spots using strong and risk-based MFA | |
Tundis et al. | The role of Information and Communication Technology (ICT) in modern criminal organizations | |
Grzonkowski et al. | D-FOAF-Security aspects in distributed user management system | |
Liu et al. | Account Lockouts: Characterizing and Preventing Account Denial-of-Service Attacks | |
Sharma et al. | Security analysis on social media networks via STRIDE model | |
Unsel et al. | Risk-Based Authentication for OpenStack: A Fully Functional Implementation and Guiding Example | |
Raponi et al. | A spark is enough in a straw world: A study of websites password management in the wild | |
Paquet et al. | The business case for network security: advocacy, governance, and ROI | |
Li | On Enhancing Security of Password-Based Authentication | |
Golla et al. | " I want my money back!" Limiting Online Password-Guessing Financially. | |
Kangwa et al. | Improved Protection of User Data Through the Use of a Traceable Anonymous One Time Password | |
Ananya | ADDING A TIMER TO CAPTCHA-BASED RGB COLOR AUTHENTICATION | |
Schmidt et al. | Sender scorecards | |
Valentijn et al. | Detection and Detection Evasion with Man-in-the-Middle Phishing |