[go: up one dir, main page]

Weber, 2020 - Google Patents

Network Security for EIS and ECS Systems

Weber, 2020

Document ID
17648298199370748860
Author
Weber J
Publication year
Publication venue
Information Technology for Energy Managers

External Links

Snippet

AS ENERGY and facility managers increasingly utilize web-based information systems, they must also develop security for their information and their systems. This chapter describes some of the security nightmares that lurk in cyberspace, waiting like evil villains, to attack …
Continue reading at www.taylorfrancis.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords

Similar Documents

Publication Publication Date Title
Kemmerer Cybersecurity
US6298445B1 (en) Computer security
Marinova-Boncheva A short survey of intrusion detection systems
Mohammed et al. Automatic defense against zero-day polymorphic worms in communication networks
Sadiqui Computer network security
WO1999056196A1 (en) Computer security
Alrubaie et al. A cybersecurity architecture to mitigate shamoon attacks
Weber Network Security for EIS and ECS Systems
Cisco Why You Need a Firewall
Cisco Why You Need a Firewall
Cisco Why You Need a Firewall
Cisco Why You Need a Firewall
Cisco Why You Need a Firewall
Cisco Why You Need a Firewall
Dunigan et al. Intrusion detection and intrusion prevention on a large network: A case study
Karamagi Comptia Security+ Practice Exams
Soriano Information and network security
Harrison et al. A protocol layer survey of network security
Briain Access Control
Арустамов et al. Профессиональный иностранный язык для специалистов в области компьютерной безопасности: учебное пособие
Opirskyy et al. Detection of Network Attacks Based on the RedHunt Virtual Machine
Abdulhamid et al. Advanced Computer and Network Security
Hontañón Linux Security: Craig Hunt Linux Library
Ahmed et al. Cloud Security and Pivoting Exploitations
Mavrakis Vulnerabilities of ISPs