Nothing Special   »   [go: up one dir, main page]

Ruha, 2018 - Google Patents

Cybersecurity of computer networks

Ruha, 2018

View PDF
Document ID
15880616743472002858
Author
Ruha T
Publication year

External Links

Snippet

The subject of this thesis is the basics of cybersecurity and particularly from companies' points of view. The thesis introduces policies, processes, controls and some technology for protecting a network and most important in cybersecurity is security and awareness training …
Continue reading at www.theseus.fi (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Souppaya et al. Guide to enterprise telework, remote access, and bring your own device (BYOD) security
Scarfone et al. Guide to general server security
AL-Hawamleh Predictions of cybersecurity experts on future cyber-attacks and related cybersecurity measures
Arogundade Network security concepts, dangers, and defense best practical
Ibarra et al. Ransomware impact to SCADA systems and its scope to critical infrastructure
Gupta et al. Taxonomy of cloud security
Aboelfotoh et al. A review of cyber-security measuring and assessment methods for modern enterprises
Atieh Assuring the Optimum Security Level for Network, Physical and Cloud Infrastructure
Dees et al. Enhancing Infrastructure Security in Real Estate
Miloslavskaya et al. Taxonomy for unsecure big data processing in security operations centers
Ahmad et al. Cloud Computing–Threats and Challenges
Miloslavskaya Network protection tools for network security intelligence centers
Ahmad et al. Security challenges from abuse of cloud service threat
Nash An undirected attack against critical infrastructure
Ruha Cybersecurity of computer networks
Rocha Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing
Kujo Implementing Zero Trust Architecture for Identities and Endpoints with Microsoft tools
Kumar Intrusion detection and prevention system in enhancing security of cloud environment
KR20100067383A (en) Server security system and server security method
Choi IoT (Internet of Things) based Solution Trend Identification and Analysis Research
Goyal et al. Cloud Computing and Security
Dhondge Lifecycle IoT Security for Engineers
Kim et al. A Study on the Security Requirements Analysis to build a Zero Trust-based Remote Work Environment
Sailakshmi Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud
Karamagi Comptia Security+ Practice Exams