[go: up one dir, main page]

Ngiyulu, 2025 - Google Patents

Cybersecurity Project at Company X

Ngiyulu, 2025

View PDF
Document ID
7862711701505284729
Author
Ngiyulu R
Publication year

External Links

Snippet

In today's rapidly evolving digital landscape, organizations must proactively assess and enhance their cybersecurity safeguards, postures, and tools to stay ahead of emerging threats. With cybercriminals continuously seeking new vulnerabilities to exploit, businesses …
Continue reading at scholarworks.calstate.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Similar Documents

Publication Publication Date Title
Vasudevan et al. Application security in the ISO27001: 2013 Environment
Choi et al. A HIPAA security and privacy compliance audit and risk assessment mitigation approach
Krishnamoorthi et al. Active Directory Holds the Keys to your Kingdom, but is it Secure
Sailakshmi Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud
Cui et al. Enterprise Security Incident Analysis and Countermeasures Based on the T-Mobile Data Breach
Njuguna et al. An evaluation of BYOD integration cybersecurity concerns: A case study
Ngiyulu Cybersecurity Project at Company X
Data Georgia
Lang et al. Managing the Cybersecurity Risks of Teleworking in the Post-Pandemic'New Normal'
Feagin The value of cyber security in small business
Kendall The Openness of Higher Education and Implications on Cybersecurity
Loy et al. South Carolina department of revenue: Mother of government dysfunction
Moses et al. Addressing the Inadequacies of Role Based Access Control (RBAC) models for highly privileged administrators: introducing the SNAP principle for mitigating privileged account breaches
Panday Ransomware in control
Halleen et al. Security monitoring with cisco security mars
Sizov Securing Organizational Assets: A Comprehensive Analysis of Privileged Access Management
Pleskach et al. Information Security Measures for a Procrastination-Combatting Digital Solution
Liukkonen CYBER SECURITY OF MULTI-LOCATIONAL WORK IN MODERN ORGANISATION
Weis Understanding Cyber Risk and Cyber Resilience
Jarzemski Cyber Risk Assessment in a Small Czech enterprise: a Case Study
Jha Core Cybersecurity Concepts
Piechowski Protecting the Privacy and Security of Health Information: A Shared Responsibility
Walsh et al. Identity Security for Software Development: Best Practices That Every Developer Must Know
Waltermire et al. Privileged Account Management for the Financial Services Sector
ZURLO et al. Cybersecurity Primer for Local Government Leaders