Hassan et al., 2017 - Google Patents
Digital privacy and security using Windows: A practical guideHassan et al., 2017
- Document ID
- 6533827763793972344
- Author
- Hassan N
- Hijazi R
- Publication year
External Links
Snippet
Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques. This book …
- 238000000034 method 0 abstract description 60
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hassan et al. | Open source intelligence methods and tools | |
| Fire et al. | Online social networks: threats and solutions | |
| Bujlow et al. | A survey on web tracking: Mechanisms, implications, and defenses | |
| Heartfield et al. | A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks | |
| Dalek et al. | Citizen Lab: The Predator in Your Pocket: A Multidisciplinary Assessment of the Stalkerware Application Industry | |
| Pande | Introduction to cyber security | |
| Subrahmanian et al. | The global cyber-vulnerability report | |
| Hassan et al. | Digital privacy and security using Windows: A practical guide | |
| Birthriya et al. | A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies | |
| Deliri et al. | Security and Privacy Issues in Social Networks. | |
| Wilner et al. | On the social science of ransomware: Technology, security, and society | |
| Alghenaim et al. | Phishing attack types and mitigation: A survey | |
| Oreku et al. | Cybercrime: Concerns, challenges and opportunities | |
| Imtiaz et al. | Analysis of cybersecurity measures for detection, prevention, and misbehaviour of social systems | |
| Kissell | Take control of your online privacy | |
| Broadhurst | Cybercrime: Thieves, swindlers, bandits, and privateers in cyberspace | |
| Jakobsson | The death of the internet | |
| Alotaibi et al. | Threats, crimes and issues of privacy of users’ information shared on online social networks | |
| Norris | Mitigating the effects of doxing | |
| Bareh | Assessment of the privacy and security practices of the Indian academic websites | |
| Sunhare | Study of security vulnerabilities in social networking websites | |
| Hudaib | Comprehensive social media security analysis & xkeyscore espionage technology | |
| Jayakumar et al. | A review and survey on smartphones: The closest enemy to privacy | |
| Al-Hyasat et al. | A comprehensive review on digital security and privacy on social networks: The role of users’ awareness | |
| Roddel | The Ultimate Guide to Internet Safety Second Edition |