Weber, 2020 - Google Patents
Network Security for EIS and ECS SystemsWeber, 2020
- Document ID
- 17648298199370748860
- Author
- Weber J
- Publication year
- Publication venue
- Information Technology for Energy Managers
External Links
Snippet
AS ENERGY and facility managers increasingly utilize web-based information systems, they must also develop security for their information and their systems. This chapter describes some of the security nightmares that lurk in cyberspace, waiting like evil villains, to attack …
- 238000002360 preparation method 0 abstract description 7
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kemmerer | Cybersecurity | |
US6298445B1 (en) | Computer security | |
Marinova-Boncheva | A short survey of intrusion detection systems | |
Mohammed et al. | Automatic defense against zero-day polymorphic worms in communication networks | |
Sadiqui | Computer network security | |
WO1999056196A1 (en) | Computer security | |
Alrubaie et al. | A cybersecurity architecture to mitigate shamoon attacks | |
Weber | Network Security for EIS and ECS Systems | |
Cisco | Why You Need a Firewall | |
Cisco | Why You Need a Firewall | |
Cisco | Why You Need a Firewall | |
Cisco | Why You Need a Firewall | |
Cisco | Why You Need a Firewall | |
Cisco | Why You Need a Firewall | |
Dunigan et al. | Intrusion detection and intrusion prevention on a large network: A case study | |
Karamagi | Comptia Security+ Practice Exams | |
Soriano | Information and network security | |
Harrison et al. | A protocol layer survey of network security | |
Briain | Access Control | |
Арустамов et al. | Профессиональный иностранный язык для специалистов в области компьютерной безопасности: учебное пособие | |
Opirskyy et al. | Detection of Network Attacks Based on the RedHunt Virtual Machine | |
Abdulhamid et al. | Advanced Computer and Network Security | |
Hontañón | Linux Security: Craig Hunt Linux Library | |
Ahmed et al. | Cloud Security and Pivoting Exploitations | |
Mavrakis | Vulnerabilities of ISPs |