Ruha, 2018 - Google Patents
Cybersecurity of computer networksRuha, 2018
View PDF- Document ID
- 15880616743472002858
- Author
- Ruha T
- Publication year
External Links
Snippet
The subject of this thesis is the basics of cybersecurity and particularly from companies' points of view. The thesis introduces policies, processes, controls and some technology for protecting a network and most important in cybersecurity is security and awareness training …
- 238000000034 method 0 abstract description 30
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Souppaya et al. | Guide to enterprise telework, remote access, and bring your own device (BYOD) security | |
Scarfone et al. | Guide to general server security | |
AL-Hawamleh | Predictions of cybersecurity experts on future cyber-attacks and related cybersecurity measures | |
Arogundade | Network security concepts, dangers, and defense best practical | |
Ibarra et al. | Ransomware impact to SCADA systems and its scope to critical infrastructure | |
Gupta et al. | Taxonomy of cloud security | |
Aboelfotoh et al. | A review of cyber-security measuring and assessment methods for modern enterprises | |
Atieh | Assuring the Optimum Security Level for Network, Physical and Cloud Infrastructure | |
Dees et al. | Enhancing Infrastructure Security in Real Estate | |
Miloslavskaya et al. | Taxonomy for unsecure big data processing in security operations centers | |
Ahmad et al. | Cloud Computing–Threats and Challenges | |
Miloslavskaya | Network protection tools for network security intelligence centers | |
Ahmad et al. | Security challenges from abuse of cloud service threat | |
Nash | An undirected attack against critical infrastructure | |
Ruha | Cybersecurity of computer networks | |
Rocha | Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing | |
Kujo | Implementing Zero Trust Architecture for Identities and Endpoints with Microsoft tools | |
Kumar | Intrusion detection and prevention system in enhancing security of cloud environment | |
KR20100067383A (en) | Server security system and server security method | |
Choi | IoT (Internet of Things) based Solution Trend Identification and Analysis Research | |
Goyal et al. | Cloud Computing and Security | |
Dhondge | Lifecycle IoT Security for Engineers | |
Kim et al. | A Study on the Security Requirements Analysis to build a Zero Trust-based Remote Work Environment | |
Sailakshmi | Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud | |
Karamagi | Comptia Security+ Practice Exams |