[go: up one dir, main page]

Asija et al., 2025 - Google Patents

Cyber security: Emerging trends best practices

Asija et al., 2025

Document ID
5912870700521136567
Author
Asija D
Viral R
Publication year
Publication venue
Cyber Security Solutions for Protecting and Building the Future Smart Grid

External Links

Snippet

This chapter offers a concise but thorough analysis of cybersecurity, emphasizing important topics including protecting computer networks, systems, and data from various cyber threats. It highlights the necessity of strong defenses while addressing the threats posed by insiders …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
Kafi et al. Securing financial information in the digital realm: case studies in cybersecurity for accounting data protection
Jang-Jaccard et al. A survey of emerging threats in cybersecurity
Möller Threats and threat intelligence
Ibrahim A review on the mechanism mitigating and eliminating internet crimes using modern technologies: mitigating internet crimes using modern technologies
Priyadarshini Introduction on cybersecurity
Beretas Information systems security, detection and recovery from cyber attacks
Jariwala The Cyber Security Roadmap A Comprehensive Guide to Cyber Threats, Cyber Laws, and Cyber Security Training for a Safer Digital World
Asbaş et al. Cyberattack and cyberwarfare strategies for businesses
Rayhan Cybersecurity in the digital age: Assessing threats and strengthening defenses
Aijaz et al. Security operations center—A need for an academic environment
US12505209B2 (en) Cybersecurity workflow management using autodetection
Akinsanya Securing the future: Implementing a zero-trust framework in us critical infrastructure cybersecurity
Asija et al. Cyber security: Emerging trends best practices
Almass et al. Comprehensive study on cyber security and cyber attacks
Kujo Implementing zero trust architecture for identities and endpoints with Microsoft tools
Mack Cyber security
Rawal et al. The basics of hacking and penetration testing
Xun et al. Building Trust in Cloud Computing: Strategies for Resilient Security
Jadwani et al. Cybersecurity Techniques for Business and Finance Systems
Adavelli et al. AI and Cybersecurity: Advancements in Threat Detection and Prevention
Iting et al. Understanding the critical role of information assurance in mitigating cybercrime risks
Hlatshwayo Cybersecurity in the digital space
Lingamgunta Cyber Security For Beginners
Athukorale et al. Evaluating Advanced Cybersecurity Technologies for Cloud Environments
Javed et al. Study on cybersecurity: Trending challenges, emerging trends, and threats