+

Alsmadi et al., 2018 - Google Patents

Introduction to information security

Alsmadi et al., 2018

Document ID
14303454032524665900
Author
Alsmadi I
Burdwell R
Aleroud A
Wahbeh A
Al-Qudah M
Al-Omari A
Publication year
Publication venue
Practical Information Security: A Competency-Based Education Course

External Links

Snippet

Nowadays, security is becoming number one priority for governments, organization, companies, and individuals. Security is all about protecting critical and valuable assets. Protecting valuable and critical assets, whether they are tangible or intangible, is a process …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30613Indexing
    • G06F17/30619Indexing indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/22Manipulating or registering by use of codes, e.g. in sequence of text characters
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/02Knowledge representation
    • G06N5/022Knowledge engineering, knowledge acquisition

Similar Documents

Publication Publication Date Title
Mansfield-Devine Ransomware: taking businesses hostage
Herrera Montano et al. Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat
Sargiotis Data security and privacy: Protecting sensitive information
de Oliveira Albuquerque et al. Leveraging information security and computational trust for cybersecurity
Yahya et al. Using goal-question-metric (GQM) approach to assess security in cloud storage
Asaad et al. A cyber security threats, vulnerability, challenges and proposed solution
Alsmadi et al. Practical information security
Al Qartah Evolving ransomware attacks on healthcare providers
Chapple et al. CompTIA security+ study guide: exam SY0-601
Belmabrouk Cyber criminals and data privacy measures
Taherdoost E-business security and control
Stevens et al. It lurks within: a look at the unexpected security implications of compliance programs
Alsmadi et al. Introduction to information security
Senapati et al. Impact of information leakage and conserving digital privacy
Parker Healthcare regulations, threats, and their impact on cybersecurity
Betz An analysis of the relationship between security information technology enhancements and computer security breaches and incidents
Kambourakis et al. Information security in the age of EU Institutions digitalisation, a landscape analysis
Boppana Data Privacy and Security in Dynamics CRM Implementations
Khidzir et al. Guardians of Data: A Comprehensive Guide to Digital Data Protection
Honan ISO27001 in a Windows Environment: The best practice handbook for a Microsoft Windows environment
Bey et al. An Analysis of Cybersecurity Data Breach in the State of California
Pandya et al. Review on cybersecurity and techniques
Khandare et al. A Global Overview of Data Security, Safety, Corporate Data Privacy, and Data Protection
Blancaflor et al. Medusa Ransomware against Data Privacy: A Comprehensive Study of Ransomware Attacks Across Various Organizations and Strategic Recommendations for Future Prevention
Jha Core Cybersecurity Concepts
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载