Dalwadi, 2006 - Google Patents
Network And Data SecurityDalwadi, 2006
View PDF- Document ID
- 2018303739278982719
- Author
- Dalwadi C
- Publication year
External Links
Snippet
With a growing number of users getting connected to the Internet and given their growing reliance on computers, it has become increasingly important to protect the confidential information stored locally or on the Internet. There are people who greatly under estimate …
- 238000000034 method 0 abstract description 101
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9781114B2 (en) | Computer security system | |
US20190354709A1 (en) | Enforcement of same origin policy for sensitive data | |
US8136149B2 (en) | Security system with methodology providing verified secured individual end points | |
US7627896B2 (en) | Security system providing methodology for cooperative enforcement of security policies during SSL sessions | |
US10764264B2 (en) | Technique for authenticating network users | |
US7752320B2 (en) | Method and apparatus for content based authentication for network access | |
US7725589B2 (en) | System, method, apparatus, and computer program product for facilitating digital communications | |
Atashzar et al. | A survey on web application vulnerabilities and countermeasures | |
Avolio et al. | A network perimeter with secure external access | |
Sangster et al. | Network endpoint assessment (NEA): Overview and requirements | |
Khandelwal et al. | Frontline techniques to prevent web application vulnerability | |
CN116846614A (en) | Trusted computing-based MQTT protocol message security processing method and system | |
Sagar et al. | Information security: safeguarding resources and building trust | |
Maidine et al. | Cloud Identity Management Mechanisms and Issues | |
WO2009005698A1 (en) | Computer security system | |
Dalwadi | Network And Data Security | |
Kuzminykh et al. | Mechanisms of ensuring security in Keystone service | |
Viegas et al. | IT Security Technical Controls | |
Sintaro et al. | SDP And VPN For Remote Access: A Comparative Study And Performance Evaluation | |
Qureshi | Analysis of Network Security Through VAPT and Network Monitoring | |
Harrison et al. | A protocol layer survey of network security | |
Sarvepalli | Designing Network Security Labs | |
Smyth | Security+ Essentials | |
Parker et al. | Numbers and Symbols | |
Luse | Roaming user-based distributed firewalls |