[go: up one dir, main page]

Herrmann, 2009 - Google Patents

Security strategy: From soup to nuts

Herrmann, 2009

Document ID
7949304636408445350
Author
Herrmann M
Publication year
Publication venue
Information Security Journal: A Global Perspective

External Links

Snippet

ABSTRACT To paraphrase Calvin Coolidge, the business of the Internet is business. The more business done on the Internet, the more need for regulation of that business. Many of the existing government and industry regulations deal with security measures, and for that …
Continue reading at www.tandfonline.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • G06F17/21Text processing
    • G06F17/22Manipulating or registering by use of codes, e.g. in sequence of text characters
    • G06F17/2288Version control
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30011Document retrieval systems

Similar Documents

Publication Publication Date Title
Doherty et al. Aligning the information security policy with the strategic information systems plan
Легенчук et al. Protection of accounting information in the conditions of cyber security
Adriko et al. Does cyber insurance promote cyber security best practice? an analysis based on insurance application forms
Kissel et al. Small business information security: The fundamentals
Govindji et al. A context adaptive framework for IT governance, risk, compliance and security
Jones et al. Analysis of Data Recovered from Computer Disks released for Resale by organisations
Moid Fighting Cyber Crimes Using Forensic Accounting: A Tool to Enhance Operational Efficiency.
Macharia Cloud computing risk: a decision-making framework
Kapoor et al. Medical data breaches: What the reported data illustrates, and implications for transitioning to electronic medical records
Parker Healthcare regulations, threats, and their impact on cybersecurity
Renee Flasher Accounting firm data breaches: One state's records
Beeskow Reducing security risk using data loss prevention technology
Herrmann Security strategy: From soup to nuts
Toohey Beyond Technophobia: Lawyers’ Ethical and Legal Obligations to Monitor Evolving Technology and Security Risks
Honan ISO27001 in a Windows Environment: The best practice handbook for a Microsoft Windows environment
Bey et al. An Analysis of Cybersecurity Data Breach in the State of California
Loumbas et al. Data Security Implications in Digital Health:: A Cautionary Tale
Atyam Effectiveness of security control risk assessments for enterprises: Assess on the business perspective of security risks
Musa The cybersecurity vulnerabilities of SME firms in South Africa, a systems engineering perspective
Brahme et al. A review of cyber crime: An ever growing threat and its influence on society & IT sector
Bhakhri et al. Examining the Consequences of Cyberattacks on Businesses and Organizations
Rahman All it takes is one: Securing your practice against cybercriminals
Foster Managing e-business risk to mitigate loss: along with the speed and convenience of e-business come new risks, such as identity theft and cyberextortion. Technology has increased the amount of confidential information at risk, and can exacerbate financial and reputational loss.
Maja et al. Challenges of Cyber Security in Insurance Business
Adriko et al. Cyber Security Best Practice? An Analysis based on Insurance Application Forms. Digital Threats: Research and Practice. ISSN 2692-1626.