[go: up one dir, main page]

ALARM, 2011 - Google Patents

FortiGate-200B/300A/300A-HD/310B/311B/620B/800

ALARM, 2011

View PDF
Document ID
9410306798695471160
Author
ALARM H
Publication year

External Links

Snippet

This document is a FIPS 140-2 Security Policy for Fortinet Incorporated's FortiGate-200B, 300A, 300A-HD, 310B, 311B, 620B and 800 Multi-Threat Security Systems. This policy describes how the FortiGate-200B, 300A, 300AHD, 310B, 311B, 620B and 800 models …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
US9043897B2 (en) Payment card industry (PCI) compliant architecture and associated methodology of managing a service infrastructure
Kesh et al. A framework for analyzing e‐commerce security
US8412945B2 (en) Systems and methods for implementing security in a cloud computing environment
US9124640B2 (en) Systems and methods for implementing computer security
US8285984B2 (en) Secure network extension device and method
Rocha Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing
ALARM FortiGate-200B/300A/300A-HD/310B/311B/620B/800
SPEED FIPS 140-2 Security Policy
ASM FIPS 140-2 Security Policy
HA et al. FIPS 140-2 Security Policy
Singh et al. CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260)
ALARM et al. FIPS 140-2 Security Policy
DOWN et al. FIPS 140-2 Security Policy
Nejad Cyber Security
Powered FIPS 140-2 Security Policy
MAJORMINORUSER1USER2USER et al. FIPS 140-2 Security Policy
ASM FIPS 140-2 Security Policy
ADM FIPS 140-2 Security Policy
LINKACT FIPS 140-2 Security Policy
WAN FIPS 140-2 Security Policy
Enter et al. FIPS 140-2 Security Policy
Ngongang Cloud Computing Security
CONSOLE et al. FIPS 140-2 Security Policy
Ramakic et al. Data protection in microcomputer systems and networks
Ruha Cybersecurity of computer networks