Haber, 2020 - Google Patents
The CloudHaber, 2020
- Document ID
- 12664600046628476975
- Author
- Haber M
- Publication year
- Publication venue
- Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
External Links
Snippet
The history of passwords dates back to the Roman military. Initially, they were carved into wood and soldiers passed them around via the active guard on duty. They were a shared resource. Today, the most common storage of a password is the human brain, and not …
- 210000004556 Brain 0 abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
- G06F17/2288—Version control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/24—Editing, e.g. insert/delete
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11750609B2 (en) | Dynamic computing resource access authorization | |
EP3590065B1 (en) | Delegating security policy management authority to managed accounts | |
US9501666B2 (en) | Polymorphic computing architectures | |
JP6625636B2 (en) | Identity infrastructure as a service | |
US10552796B1 (en) | Approval service in a catalog service platform | |
US10579816B2 (en) | Use case driven granular application and browser data loss prevention controls | |
US10198560B2 (en) | Enforcing licensing policies using an application wrapper | |
Hon et al. | Who is responsible for ‘personal data’in cloud computing?—The cloud of unknowing, Part 2 | |
KR20150052010A (en) | Network system for implementing a cloud platform | |
JP2022513596A (en) | Systems and methods for live SAAS objects | |
Pierer | Mobile Device Management | |
Chadwick et al. | My private cloud–granting federated access to cloud resources | |
Haber | The Cloud | |
Chilberto et al. | Identity Security with Azure Active Directory | |
WO2015102714A2 (en) | Polymorphic computing architectures | |
Garbis et al. | What Is Zero Trust? | |
Sarferaz | Identity and Access Management | |
Copeland et al. | Reduce cyber security vulnerabilities: Identity layer | |
Katzer | Azure and office 365 security | |
Copeland et al. | Reduce Cyber Security Vulnerabilities: IaaS and Data | |
Garbis et al. | Zero trust scenarios | |
Toelle | Information Protection | |
Stefanovic et al. | Azure Security and Compliance | |
Haber et al. | Asset Management | |
Bell | Migrating to MDS |