Herrmann, 2009 - Google Patents
Security strategy: From soup to nutsHerrmann, 2009
- Document ID
- 7949304636408445350
- Author
- Herrmann M
- Publication year
- Publication venue
- Information Security Journal: A Global Perspective
External Links
Snippet
ABSTRACT To paraphrase Calvin Coolidge, the business of the Internet is business. The more business done on the Internet, the more need for regulation of that business. Many of the existing government and industry regulations deal with security measures, and for that …
- 235000014347 soups 0 title description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
- G06F17/2288—Version control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30011—Document retrieval systems
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Doherty et al. | Aligning the information security policy with the strategic information systems plan | |
| Легенчук et al. | Protection of accounting information in the conditions of cyber security | |
| Adriko et al. | Does cyber insurance promote cyber security best practice? an analysis based on insurance application forms | |
| Kissel et al. | Small business information security: The fundamentals | |
| Govindji et al. | A context adaptive framework for IT governance, risk, compliance and security | |
| Jones et al. | Analysis of Data Recovered from Computer Disks released for Resale by organisations | |
| Moid | Fighting Cyber Crimes Using Forensic Accounting: A Tool to Enhance Operational Efficiency. | |
| Macharia | Cloud computing risk: a decision-making framework | |
| Kapoor et al. | Medical data breaches: What the reported data illustrates, and implications for transitioning to electronic medical records | |
| Parker | Healthcare regulations, threats, and their impact on cybersecurity | |
| Renee Flasher | Accounting firm data breaches: One state's records | |
| Beeskow | Reducing security risk using data loss prevention technology | |
| Herrmann | Security strategy: From soup to nuts | |
| Toohey | Beyond Technophobia: Lawyers’ Ethical and Legal Obligations to Monitor Evolving Technology and Security Risks | |
| Honan | ISO27001 in a Windows Environment: The best practice handbook for a Microsoft Windows environment | |
| Bey et al. | An Analysis of Cybersecurity Data Breach in the State of California | |
| Loumbas et al. | Data Security Implications in Digital Health:: A Cautionary Tale | |
| Atyam | Effectiveness of security control risk assessments for enterprises: Assess on the business perspective of security risks | |
| Musa | The cybersecurity vulnerabilities of SME firms in South Africa, a systems engineering perspective | |
| Brahme et al. | A review of cyber crime: An ever growing threat and its influence on society & IT sector | |
| Bhakhri et al. | Examining the Consequences of Cyberattacks on Businesses and Organizations | |
| Rahman | All it takes is one: Securing your practice against cybercriminals | |
| Foster | Managing e-business risk to mitigate loss: along with the speed and convenience of e-business come new risks, such as identity theft and cyberextortion. Technology has increased the amount of confidential information at risk, and can exacerbate financial and reputational loss. | |
| Maja et al. | Challenges of Cyber Security in Insurance Business | |
| Adriko et al. | Cyber Security Best Practice? An Analysis based on Insurance Application Forms. Digital Threats: Research and Practice. ISSN 2692-1626. |