[go: up one dir, main page]

Hassan et al., 2017 - Google Patents

Digital privacy and security using Windows: A practical guide

Hassan et al., 2017

Document ID
6533827763793972344
Author
Hassan N
Hijazi R
Publication year

External Links

Snippet

Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques. This book …
Continue reading at books.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Similar Documents

Publication Publication Date Title
Hassan et al. Open source intelligence methods and tools
Fire et al. Online social networks: threats and solutions
Bujlow et al. A survey on web tracking: Mechanisms, implications, and defenses
Heartfield et al. A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks
Dalek et al. Citizen Lab: The Predator in Your Pocket: A Multidisciplinary Assessment of the Stalkerware Application Industry
Pande Introduction to cyber security
Subrahmanian et al. The global cyber-vulnerability report
Hassan et al. Digital privacy and security using Windows: A practical guide
Birthriya et al. A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies
Deliri et al. Security and Privacy Issues in Social Networks.
Wilner et al. On the social science of ransomware: Technology, security, and society
Alghenaim et al. Phishing attack types and mitigation: A survey
Oreku et al. Cybercrime: Concerns, challenges and opportunities
Imtiaz et al. Analysis of cybersecurity measures for detection, prevention, and misbehaviour of social systems
Kissell Take control of your online privacy
Broadhurst Cybercrime: Thieves, swindlers, bandits, and privateers in cyberspace
Jakobsson The death of the internet
Alotaibi et al. Threats, crimes and issues of privacy of users’ information shared on online social networks
Norris Mitigating the effects of doxing
Bareh Assessment of the privacy and security practices of the Indian academic websites
Sunhare Study of security vulnerabilities in social networking websites
Hudaib Comprehensive social media security analysis & xkeyscore espionage technology
Jayakumar et al. A review and survey on smartphones: The closest enemy to privacy
Al-Hyasat et al. A comprehensive review on digital security and privacy on social networks: The role of users’ awareness
Roddel The Ultimate Guide to Internet Safety Second Edition