Gottipati, 2020 - Google Patents
A proposed cybersecurity model for cryptocurrency exchangesGottipati, 2020
View PDF- Document ID
- 16978655379399275382
- Author
- Gottipati H
- Publication year
External Links
Snippet
Although cryptocurrency exchanges involve blockchain technology, it is ineffective in the management of security to cryptocurrency and wallets. The most common way for a novice user to handle cryptocurrency trading is through cryptocurrency exchanges. Users have …
- 238000000034 method 0 abstract description 29
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2119—Authenticating web pages, e.g. with suspicious links
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Rizvi et al. | Identifying the attack surface for IoT network | |
| US10205742B2 (en) | Stateless web content anti-automation | |
| US20150350243A1 (en) | Safe Intelligent Content Modification | |
| Ozkaya et al. | Hands-On Cybersecurity for Finance: Identify vulnerabilities and secure your financial services from security breaches | |
| Hassan et al. | Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks | |
| Alhenaki et al. | Security in cloud computing: a survey | |
| Perumal et al. | Cybercrime issues in smart cities networks and prevention using ethical hacking | |
| Karo-Karo et al. | Investigating multiple malware as a service (MAAS): analysis and prevention techniques | |
| Dhiman et al. | Artificial Intelligence and Machine Learning-Enabled Cybersecurity Tools and Techniques | |
| Chhillar et al. | Proposed T-Model to cover 4S quality metrics based on empirical study of root cause of software failures | |
| Kujo | Implementing zero trust architecture for identities and endpoints with Microsoft tools | |
| Gottipati | A proposed cybersecurity model for cryptocurrency exchanges | |
| Stutz et al. | Cyber threat detection and mitigation using artificial intelligence–A cyber‐physical perspective | |
| Hutchings et al. | Criminals in the cloud: Crime, security threats, and prevention measures | |
| Ramaiya et al. | Cybersecurity Threats and Trust Dynamics in Digital Payment Systems: An Analysis of Domestic Fraud and User Perspectives | |
| O’Regan | Computer Crime | |
| Elrom | Security and compliance | |
| Adavelli et al. | AI and Cybersecurity: Advancements in Threat Detection and Prevention | |
| Ankele et al. | SoK: Cyber-Attack Taxonomy of Distributed Ledger-and Legacy Systems-based Financial Infrastructures | |
| Seshadri | Literature based Cyber Security Topics: Handbook | |
| Barrigar | Examining the current threat of cybercrime in mobile banking and what can be done to combat it | |
| Castillo | IT security | |
| Korchenko et al. | Analysis of Modern Solutions for the Identification of Anonymous Users | |
| Fox et al. | Enterprise Threat Model Technical Report: Cyber Threat Model for a Notional Financial Services Sector Institution | |
| Norberg | Intro to Security |