Movatterモバイル変換


[0]ホーム

URL:


Edge et al., 2010 - Google Patents

Enterprise Mac Security: Mac OS X Snow Leopard

Edge et al., 2010

Document ID
12991959042048273585
Author
Edge C
Barker W
Hunter B
Sullivan G
Barker K
Publication year

External Links

Snippet

A common misconception in the Mac community is that Mac's operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS …
Continue reading atbooks.google.com (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party

Similar Documents

PublicationPublication DateTitle
WeidmanPenetration testing: a hands-on introduction to hacking
US20220004623A1 (en)Managed isolated workspace on a user device
Pham et al.Universal serial bus based software attacks and protection solutions
Pritchett et al.Kali Linux Cookbook
ReddyPractical cyber forensics
Broad et al.Hacking with Kali: practical penetration testing techniques
Messier et al.Security strategies in Linux platforms and applications
Bettany et al.Windows virus and malware troubleshooting
Shaaban et al.Practical windows forensics
TevaultMastering linux security and hardening: Protect your linux systems from intruders, malware attacks, and other cyber threats
Anderson et al.Seven deadliest USB attacks
RahalkarCertified Ethical Hacker (CEH) Foundation Guide
Pritchett et al.BackTrack 5 Cookbook
Dunkerley et al.Mastering Windows Security and Hardening
ParasramDigital Forensics with Kali Linux: Enhance your investigation skills by performing network and memory forensics with Kali Linux 2022. x
TorsteinbøData loss prevention systems and their weaknesses
Dunkerley et al.Mastering Windows Security and Hardening: Secure and protect your Windows environment from intruders, malware attacks, and other cyber threats
BottIntroducing Windows 10 for IT Professionals
Edge et al.Enterprise Mac Security: Mac OS X Snow Leopard
TevaultMastering Linux security and hardening: secure your Linux server and protect it from intruders, malware attacks, and other external threats
Edge et al.Enterprise Mac Security: Mac OS X
Varsalone et al.Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
LeopardEnterprise Mac Security
DhavaleConstructing an Ethical Hacking Knowledge Base for Threat Awareness and Prevention
PanekWindows Server Administration Fundamentals

[8]
ページ先頭

©2009-2025 Movatter.jp