Movatterモバイル変換


[0]ホーム

URL:


Goodwin et al., 2013 - Google Patents

Developing a National strategy for CyberSecurity

Goodwin et al., 2013

ViewPDF
Document ID
3073991073616814295
Author
Goodwin C
Nicholas J
Publication year
Publication venue
Foundation for Security Growth and Innovation

External Links

Snippet

Cybersecurity has become a priority for governments around the world. Major cyberattacks, data losses, and compromised networks fill the headlines, and governments, the private sector, and citizens all recognize the need for action to improve cybersecurity. Governments …
Continue reading atdownload.microsoft.com (PDF) (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls

Similar Documents

PublicationPublication DateTitle
StallingsEffective cybersecurity: a guide to using best practices and standards
Goodwin et al.A framework for cybersecurity information sharing and risk reduction
Goodwin et al.Developing a National strategy for CyberSecurity
Schou et al.Information Assurance Handbook
PN et al.Information security in supply chains: A management control perspective
LanzCybersecurity Governance: The Role of the Audit Committee and the CPA.
Nyarko et al.Cyber security compliance among remote workers
SchreiderBuilding an effective cybersecurity program
Upfold et al.An investigation of information security in small and medium enterprises (SME's) in the Eastern Cape
Deane et al.The Official (ISC) 2 CISSP CBK Reference
Onatuyeh et al.Cybersecurity and Business Survival in Nigeria: Building Customer's Trust
Tari Schreider et al.Building effective cybersecurity programs: a security manager’s handbook
Mortazavi-AlaviA risk-driven investment model for analysing human factors in information security
Ansar et al.Cost-effective cybersecurity framework for small and medium-sized enterprises
TarimoICT security readiness checklist for developing countries: A social-technical approach
Calder et al.International IT governance: an executive guide to ISO 17799/ISO 27001
JøsangGovernance and Information Security Management
EdwardsSecurity Awareness and Skills Training
MbahAdvancing data protection in Nigeria: the need for comprehensive legislation
MoultonCybersecurity and Trade: The Increasing Use of Cybersecurity Measures and their Impact on International Trade
Bellasio et al.Developing Cybersecurity Capacity
Martin et al.Power sector cybersecurity building blocks
Sukachova et al.Strategies to strengthen cybersecurity for business resilience in the digital age
NachtigalE-business Information Systems Security Design Paradigm and Model
MEADE et al.Attacking Cybersecurity from the Inside Out.

[8]
ページ先頭

©2009-2025 Movatter.jp