Asija et al., 2025 - Google Patents
Cyber security: Emerging trends best practicesAsija et al., 2025
- Document ID
- 5912870700521136567
- Author
- Asija D
- Viral R
- Publication year
- Publication venue
- Cyber Security Solutions for Protecting and Building the Future Smart Grid
External Links
Snippet
This chapter offers a concise but thorough analysis of cybersecurity, emphasizing important topics including protecting computer networks, systems, and data from various cyber threats. It highlights the necessity of strong defenses while addressing the threats posed by insiders …
- 238000003339 best practice 0 title description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kafi et al. | Securing financial information in the digital realm: case studies in cybersecurity for accounting data protection | |
| Jang-Jaccard et al. | A survey of emerging threats in cybersecurity | |
| Möller | Threats and threat intelligence | |
| Ibrahim | A review on the mechanism mitigating and eliminating internet crimes using modern technologies: mitigating internet crimes using modern technologies | |
| Priyadarshini | Introduction on cybersecurity | |
| Beretas | Information systems security, detection and recovery from cyber attacks | |
| Jariwala | The Cyber Security Roadmap A Comprehensive Guide to Cyber Threats, Cyber Laws, and Cyber Security Training for a Safer Digital World | |
| Asbaş et al. | Cyberattack and cyberwarfare strategies for businesses | |
| Rayhan | Cybersecurity in the digital age: Assessing threats and strengthening defenses | |
| Aijaz et al. | Security operations center—A need for an academic environment | |
| US12505209B2 (en) | Cybersecurity workflow management using autodetection | |
| Akinsanya | Securing the future: Implementing a zero-trust framework in us critical infrastructure cybersecurity | |
| Asija et al. | Cyber security: Emerging trends best practices | |
| Almass et al. | Comprehensive study on cyber security and cyber attacks | |
| Kujo | Implementing zero trust architecture for identities and endpoints with Microsoft tools | |
| Mack | Cyber security | |
| Rawal et al. | The basics of hacking and penetration testing | |
| Xun et al. | Building Trust in Cloud Computing: Strategies for Resilient Security | |
| Jadwani et al. | Cybersecurity Techniques for Business and Finance Systems | |
| Adavelli et al. | AI and Cybersecurity: Advancements in Threat Detection and Prevention | |
| Iting et al. | Understanding the critical role of information assurance in mitigating cybercrime risks | |
| Hlatshwayo | Cybersecurity in the digital space | |
| Lingamgunta | Cyber Security For Beginners | |
| Athukorale et al. | Evaluating Advanced Cybersecurity Technologies for Cloud Environments | |
| Javed et al. | Study on cybersecurity: Trending challenges, emerging trends, and threats |