READ et al., 2017 - Google Patents
THE TECHNICAL UNIVERSITY OF KENYAREAD et al., 2017
View PDF- Document ID
- 10052638935950543355
- Author
- READ A
- TENDER C
- Publication year
External Links
Snippet
Technical University of Kenya (TUK) intends to deploy an" application-aware" next generation firewall with fine-grained role-based access control, capable of providing high performance required for future enterprise networks. The Next-Generation Network security …
- 238000011156 evaluation 0 description 59
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0485—Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/164—Implementing security features at a particular protocol layer at the network layer
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9935891B1 (en) | Assessing a computing resource for compliance with a computing resource policy regime specification | |
Kim et al. | Fundamentals of information systems security | |
US9106661B1 (en) | Computing resource policy regime specification and verification | |
US9264395B1 (en) | Discovery engine | |
EP3304824B1 (en) | Policy-driven compliance | |
US20080047016A1 (en) | CCLIF: A quantified methodology system to assess risk of IT architectures and cyber operations | |
JP2015534138A (en) | Method and system for secure authentication and information sharing and analysis | |
Dees et al. | Enhancing infrastructure security in real estate | |
Morris et al. | Cybersecurity as a Service | |
Jackson | Network security auditing | |
Bacik | Building an effective information security policy architecture | |
Dhillon | What to do before and after a cybersecurity breach | |
Doelitzscher et al. | Understanding cloud audits | |
Ito et al. | Investigations of top-level domain name collisions in blockchain naming services | |
READ et al. | THE TECHNICAL UNIVERSITY OF KENYA | |
Steinberg et al. | Cybersecurity All-in-one for Dummies | |
Kox et al. | Economic aspects of Internet security | |
Rogers | An Overview of the Candware Program | |
Sanga et al. | Optimizing internet bandwidth in higher learning institutions: A case of Sokoine University of Agriculture | |
Fowler | AWS for Public and Private Sectors | |
McMillan | CompTIA Advanced Security Practitioner (CASP+) CAS-004 Cert Guide | |
Vail III | Small business information security | |
Square | DUTCH-BANGLA BANK LIMITED | |
Gerber | Achieving IT Governance of social media at strategic and operational levels | |
Slagell et al. | 2015 XSEDE Federation Risk Assessment Overview |