Alsmadi et al., 2018 - Google Patents
Introduction to information securityAlsmadi et al., 2018
- Document ID
- 14303454032524665900
- Author
- Alsmadi I
- Burdwell R
- Aleroud A
- Wahbeh A
- Al-Qudah M
- Al-Omari A
- Publication year
- Publication venue
- Practical Information Security: A Competency-Based Education Course
External Links
Snippet
Nowadays, security is becoming number one priority for governments, organization, companies, and individuals. Security is all about protecting critical and valuable assets. Protecting valuable and critical assets, whether they are tangible or intangible, is a process …
- 238000000034 method 0 abstract description 25
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30613—Indexing
- G06F17/30619—Indexing indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Mansfield-Devine | Ransomware: taking businesses hostage | |
| Herrera Montano et al. | Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat | |
| Sargiotis | Data security and privacy: Protecting sensitive information | |
| de Oliveira Albuquerque et al. | Leveraging information security and computational trust for cybersecurity | |
| Yahya et al. | Using goal-question-metric (GQM) approach to assess security in cloud storage | |
| Asaad et al. | A cyber security threats, vulnerability, challenges and proposed solution | |
| Alsmadi et al. | Practical information security | |
| Al Qartah | Evolving ransomware attacks on healthcare providers | |
| Chapple et al. | CompTIA security+ study guide: exam SY0-601 | |
| Belmabrouk | Cyber criminals and data privacy measures | |
| Taherdoost | E-business security and control | |
| Stevens et al. | It lurks within: a look at the unexpected security implications of compliance programs | |
| Alsmadi et al. | Introduction to information security | |
| Senapati et al. | Impact of information leakage and conserving digital privacy | |
| Parker | Healthcare regulations, threats, and their impact on cybersecurity | |
| Betz | An analysis of the relationship between security information technology enhancements and computer security breaches and incidents | |
| Kambourakis et al. | Information security in the age of EU Institutions digitalisation, a landscape analysis | |
| Boppana | Data Privacy and Security in Dynamics CRM Implementations | |
| Khidzir et al. | Guardians of Data: A Comprehensive Guide to Digital Data Protection | |
| Honan | ISO27001 in a Windows Environment: The best practice handbook for a Microsoft Windows environment | |
| Bey et al. | An Analysis of Cybersecurity Data Breach in the State of California | |
| Pandya et al. | Review on cybersecurity and techniques | |
| Khandare et al. | A Global Overview of Data Security, Safety, Corporate Data Privacy, and Data Protection | |
| Blancaflor et al. | Medusa Ransomware against Data Privacy: A Comprehensive Study of Ransomware Attacks Across Various Organizations and Strategic Recommendations for Future Prevention | |
| Jha | Core Cybersecurity Concepts |