Ngiyulu, 2025 - Google Patents
Cybersecurity Project at Company XNgiyulu, 2025
View PDF- Document ID
- 7862711701505284729
- Author
- Ngiyulu R
- Publication year
External Links
Snippet
In today's rapidly evolving digital landscape, organizations must proactively assess and enhance their cybersecurity safeguards, postures, and tools to stay ahead of emerging threats. With cybercriminals continuously seeking new vulnerabilities to exploit, businesses …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Vasudevan et al. | Application security in the ISO27001: 2013 Environment | |
| Choi et al. | A HIPAA security and privacy compliance audit and risk assessment mitigation approach | |
| Krishnamoorthi et al. | Active Directory Holds the Keys to your Kingdom, but is it Secure | |
| Sailakshmi | Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud | |
| Cui et al. | Enterprise Security Incident Analysis and Countermeasures Based on the T-Mobile Data Breach | |
| Njuguna et al. | An evaluation of BYOD integration cybersecurity concerns: A case study | |
| Ngiyulu | Cybersecurity Project at Company X | |
| Data | Georgia | |
| Lang et al. | Managing the Cybersecurity Risks of Teleworking in the Post-Pandemic'New Normal' | |
| Feagin | The value of cyber security in small business | |
| Kendall | The Openness of Higher Education and Implications on Cybersecurity | |
| Loy et al. | South Carolina department of revenue: Mother of government dysfunction | |
| Moses et al. | Addressing the Inadequacies of Role Based Access Control (RBAC) models for highly privileged administrators: introducing the SNAP principle for mitigating privileged account breaches | |
| Panday | Ransomware in control | |
| Halleen et al. | Security monitoring with cisco security mars | |
| Sizov | Securing Organizational Assets: A Comprehensive Analysis of Privileged Access Management | |
| Pleskach et al. | Information Security Measures for a Procrastination-Combatting Digital Solution | |
| Liukkonen | CYBER SECURITY OF MULTI-LOCATIONAL WORK IN MODERN ORGANISATION | |
| Weis | Understanding Cyber Risk and Cyber Resilience | |
| Jarzemski | Cyber Risk Assessment in a Small Czech enterprise: a Case Study | |
| Jha | Core Cybersecurity Concepts | |
| Piechowski | Protecting the Privacy and Security of Health Information: A Shared Responsibility | |
| Walsh et al. | Identity Security for Software Development: Best Practices That Every Developer Must Know | |
| Waltermire et al. | Privileged Account Management for the Financial Services Sector | |
| ZURLO et al. | Cybersecurity Primer for Local Government Leaders |