ALARM, 2011 - Google Patents
FortiGate-200B/300A/300A-HD/310B/311B/620B/800ALARM, 2011
View PDF- Document ID
- 9410306798695471160
- Author
- ALARM H
- Publication year
External Links
Snippet
This document is a FIPS 140-2 Security Policy for Fortinet Incorporated's FortiGate-200B, 300A, 300A-HD, 310B, 311B, 620B and 800 Multi-Threat Security Systems. This policy describes how the FortiGate-200B, 300A, 300AHD, 310B, 311B, 620B and 800 models …
- 238000010200 validation analysis 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9043897B2 (en) | Payment card industry (PCI) compliant architecture and associated methodology of managing a service infrastructure | |
Kesh et al. | A framework for analyzing e‐commerce security | |
US8412945B2 (en) | Systems and methods for implementing security in a cloud computing environment | |
US9124640B2 (en) | Systems and methods for implementing computer security | |
US8285984B2 (en) | Secure network extension device and method | |
Rocha | Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing | |
ALARM | FortiGate-200B/300A/300A-HD/310B/311B/620B/800 | |
SPEED | FIPS 140-2 Security Policy | |
ASM | FIPS 140-2 Security Policy | |
HA et al. | FIPS 140-2 Security Policy | |
Singh et al. | CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260) | |
ALARM et al. | FIPS 140-2 Security Policy | |
DOWN et al. | FIPS 140-2 Security Policy | |
Nejad | Cyber Security | |
Powered | FIPS 140-2 Security Policy | |
MAJORMINORUSER1USER2USER et al. | FIPS 140-2 Security Policy | |
ASM | FIPS 140-2 Security Policy | |
ADM | FIPS 140-2 Security Policy | |
LINKACT | FIPS 140-2 Security Policy | |
WAN | FIPS 140-2 Security Policy | |
Enter et al. | FIPS 140-2 Security Policy | |
Ngongang | Cloud Computing Security | |
CONSOLE et al. | FIPS 140-2 Security Policy | |
Ramakic et al. | Data protection in microcomputer systems and networks | |
Ruha | Cybersecurity of computer networks |