[go: up one dir, main page]

Ballew, 2016 - Google Patents

Secure and Protect Windows To Go Drives

Ballew, 2016

Document ID
10536360878848193071
Author
Ballew J
Publication year
Publication venue
Windows To Go: A Guide for Users and IT Professionals

External Links

Snippet

You've learned a lot thus far about creating and deploying Windows to Go drives, and you've learned about using BitLocker, but I haven't talked at length about any other security-related topics. In this chapter that's what I'll cover. Although some of this will be highly technical, it's …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B33/00Constructional parts, details or accessories not provided for in the preceding groups
    • G11B33/02Cabinets; Cases; Stands; Disposition of apparatus therein or thereon
    • G11B33/04Cabinets; Cases; Stands; Disposition of apparatus therein or thereon modified to store record carriers
    • G11B33/0405Cabinets; Cases; Stands; Disposition of apparatus therein or thereon modified to store record carriers for storing discs
    • G11B33/0494Cabinets; Cases; Stands; Disposition of apparatus therein or thereon modified to store record carriers for storing discs packages made by folding
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Similar Documents

Publication Publication Date Title
US9690954B2 (en) Securing encrypted virtual hard disks
US12321458B2 (en) Methods and systems for providing and controlling cryptographic secure communications terminal operable in a plurality of languages
JP6165883B2 (en) Secure virtual machine migration
EP2625643B1 (en) Methods and systems for providing and controlling cryptographically secure communications across unsecured networks between a secure virtual terminal and a remote system
US8707457B2 (en) Methods and systems for forcing an application to store data in a secure storage location
CN105379223B (en) Manage the method and apparatus to the access of ERM
CN104969201B (en) Secure interface for invoking privileged operations
CN107637044B (en) Secure in-band service detection
JP2019079504A (en) Secure single sign on and conditional access for client applications
CN105027096A (en) Protect the results of privileged computing operations
CN105637523A (en) Secure client drive mapping and file storage system for mobile device management type security
JP2022504499A (en) Systems and methods for system-on-chip traffic optimization of intermediate devices
CN113574837A (en) Tracking image senders on client devices
JP2024539854A (en) Control of access to computing resources implemented in an isolated environment
CN113039769A (en) System and method for deep linking of SAAS applications via embedded browser
Salah et al. Analyzing the security of Windows 7 and Linux for cloud computing
Ballew Secure and Protect Windows To Go Drives
Banica et al. Advanced Security Models for Cloud Infrastructures
La Lau Secure Shell (SSH)
Cherry Computer Operating System Security
JP2025541953A (en) Updating the secure guest metadata for a specific guest instance
Montehermoso et al. Microsoft Windows Server 2003 security enhancements and new features
Walker IV Guide to the Secure Configuration and Administration of Microsoft Internet Information Services 5.0®
MacDonald Deploying ASP. NET Applications
Christman Guide to the Secure Configuration and Administration of Microsoft Internet Information Services 5.0�