+

Gottipati, 2020 - Google Patents

A proposed cybersecurity model for cryptocurrency exchanges

Gottipati, 2020

View PDF
Document ID
16978655379399275382
Author
Gottipati H
Publication year

External Links

Snippet

Although cryptocurrency exchanges involve blockchain technology, it is ineffective in the management of security to cryptocurrency and wallets. The most common way for a novice user to handle cryptocurrency trading is through cryptocurrency exchanges. Users have …
Continue reading at ualberta.scholaris.ca (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Similar Documents

Publication Publication Date Title
Rizvi et al. Identifying the attack surface for IoT network
US10205742B2 (en) Stateless web content anti-automation
US20150350243A1 (en) Safe Intelligent Content Modification
Ozkaya et al. Hands-On Cybersecurity for Finance: Identify vulnerabilities and secure your financial services from security breaches
Hassan et al. Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks
Alhenaki et al. Security in cloud computing: a survey
Perumal et al. Cybercrime issues in smart cities networks and prevention using ethical hacking
Karo-Karo et al. Investigating multiple malware as a service (MAAS): analysis and prevention techniques
Dhiman et al. Artificial Intelligence and Machine Learning-Enabled Cybersecurity Tools and Techniques
Chhillar et al. Proposed T-Model to cover 4S quality metrics based on empirical study of root cause of software failures
Kujo Implementing zero trust architecture for identities and endpoints with Microsoft tools
Gottipati A proposed cybersecurity model for cryptocurrency exchanges
Stutz et al. Cyber threat detection and mitigation using artificial intelligence–A cyber‐physical perspective
Hutchings et al. Criminals in the cloud: Crime, security threats, and prevention measures
Ramaiya et al. Cybersecurity Threats and Trust Dynamics in Digital Payment Systems: An Analysis of Domestic Fraud and User Perspectives
O’Regan Computer Crime
Elrom Security and compliance
Adavelli et al. AI and Cybersecurity: Advancements in Threat Detection and Prevention
Ankele et al. SoK: Cyber-Attack Taxonomy of Distributed Ledger-and Legacy Systems-based Financial Infrastructures
Seshadri Literature based Cyber Security Topics: Handbook
Barrigar Examining the current threat of cybercrime in mobile banking and what can be done to combat it
Castillo IT security
Korchenko et al. Analysis of Modern Solutions for the Identification of Anonymous Users
Fox et al. Enterprise Threat Model Technical Report: Cyber Threat Model for a Notional Financial Services Sector Institution
Norberg Intro to Security
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载