[go: up one dir, main page]

Jimmy, 2024 - Google Patents

Senior Cloud consu

Jimmy, 2024

View PDF
Document ID
17214052290494504435
Author
Jimmy F
Publication year

External Links

Snippet

The proliferation of internet usage has surged dramatically, prompting in businesses to conduct myriad transactions online rather than in physica onset of the COVID-19 pandemic has further propelled this trend. C traditional forms of crime have migrated to the digital …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Similar Documents

Publication Publication Date Title
US12244641B2 (en) Application firewall
Cinar et al. The current state and future of mobile security in the light of the recent mobile security threat reports
US10924517B2 (en) Processing network traffic based on assessed security weaknesses
US20090328210A1 (en) Chain of events tracking with data tainting for automated security feedback
Waheed et al. Zero-Day Exploits in Cybersecurity: Case Studies and Countermeasure
CN113824678A (en) System and method for processing information security events to detect network attacks
Dhiman et al. Artificial Intelligence and Machine Learning-Enabled Cybersecurity Tools and Techniques
Ahmad et al. Security challenges from abuse of cloud service threat
Gounder et al. New ways to fight malware
Shaikh et al. Exploring recent challenges in cyber security and their solutions
Jimmy Senior Cloud consu
Adavelli et al. AI and Cybersecurity: Advancements in Threat Detection and Prevention
Lakshmi Beginning Security with Microsoft Technologies
Jawad et al. Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems
Morag The threats to jupyter notebook
Athukorale et al. Evaluating Advanced Cybersecurity Technologies for Cloud Environments
Agrawal et al. Review of Cybersecurity Post-COVID-19
Neelakrishnan Autonomous Data Security: Creating a Proactive Enterprise Protection Plan
Zhang et al. Controlling Network Risk in E-commerce
Hassan et al. Extraction of malware iocs and ttps mapping with coas
Agbamoro Software Testing, Data Security and GDPR
RAO et al. Cyber Security and Vulnerability Assessment
Rehan Building Secure Cloud Infrastructures: A Cybersecurity Overview
Muteswa Cyber security insights for individuals, governments & organizations (gathered articles): a North America, Asia, Africa, South America, Oceania & Europe perspective
Lingamgunta Cyber Security For Beginners