Ballew, 2016 - Google Patents
Secure and Protect Windows To Go DrivesBallew, 2016
- Document ID
- 10536360878848193071
- Author
- Ballew J
- Publication year
- Publication venue
- Windows To Go: A Guide for Users and IT Professionals
External Links
Snippet
You've learned a lot thus far about creating and deploying Windows to Go drives, and you've learned about using BitLocker, but I haven't talked at length about any other security-related topics. In this chapter that's what I'll cover. Although some of this will be highly technical, it's …
- 230000005540 biological transmission 0 abstract description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B33/00—Constructional parts, details or accessories not provided for in the preceding groups
- G11B33/02—Cabinets; Cases; Stands; Disposition of apparatus therein or thereon
- G11B33/04—Cabinets; Cases; Stands; Disposition of apparatus therein or thereon modified to store record carriers
- G11B33/0405—Cabinets; Cases; Stands; Disposition of apparatus therein or thereon modified to store record carriers for storing discs
- G11B33/0494—Cabinets; Cases; Stands; Disposition of apparatus therein or thereon modified to store record carriers for storing discs packages made by folding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9690954B2 (en) | Securing encrypted virtual hard disks | |
| US12321458B2 (en) | Methods and systems for providing and controlling cryptographic secure communications terminal operable in a plurality of languages | |
| JP6165883B2 (en) | Secure virtual machine migration | |
| EP2625643B1 (en) | Methods and systems for providing and controlling cryptographically secure communications across unsecured networks between a secure virtual terminal and a remote system | |
| US8707457B2 (en) | Methods and systems for forcing an application to store data in a secure storage location | |
| CN105379223B (en) | Manage the method and apparatus to the access of ERM | |
| CN104969201B (en) | Secure interface for invoking privileged operations | |
| CN107637044B (en) | Secure in-band service detection | |
| JP2019079504A (en) | Secure single sign on and conditional access for client applications | |
| CN105027096A (en) | Protect the results of privileged computing operations | |
| CN105637523A (en) | Secure client drive mapping and file storage system for mobile device management type security | |
| JP2022504499A (en) | Systems and methods for system-on-chip traffic optimization of intermediate devices | |
| CN113574837A (en) | Tracking image senders on client devices | |
| JP2024539854A (en) | Control of access to computing resources implemented in an isolated environment | |
| CN113039769A (en) | System and method for deep linking of SAAS applications via embedded browser | |
| Salah et al. | Analyzing the security of Windows 7 and Linux for cloud computing | |
| Ballew | Secure and Protect Windows To Go Drives | |
| Banica et al. | Advanced Security Models for Cloud Infrastructures | |
| La Lau | Secure Shell (SSH) | |
| Cherry | Computer Operating System Security | |
| JP2025541953A (en) | Updating the secure guest metadata for a specific guest instance | |
| Montehermoso et al. | Microsoft Windows Server 2003 security enhancements and new features | |
| Walker IV | Guide to the Secure Configuration and Administration of Microsoft Internet Information Services 5.0® | |
| MacDonald | Deploying ASP. NET Applications | |
| Christman | Guide to the Secure Configuration and Administration of Microsoft Internet Information Services 5.0� |