CA2587867C - Dispositif de securite de reseau - Google Patents
Dispositif de securite de reseau Download PDFInfo
- Publication number
- CA2587867C CA2587867C CA2587867A CA2587867A CA2587867C CA 2587867 C CA2587867 C CA 2587867C CA 2587867 A CA2587867 A CA 2587867A CA 2587867 A CA2587867 A CA 2587867A CA 2587867 C CA2587867 C CA 2587867C
- Authority
- CA
- Canada
- Prior art keywords
- data object
- network
- security device
- network security
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US79833906P | 2006-05-08 | 2006-05-08 | |
US60/798,339 | 2006-05-08 | ||
US82915706P | 2006-10-12 | 2006-10-12 | |
US60/829,157 | 2006-10-12 |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2587867A1 CA2587867A1 (fr) | 2007-11-08 |
CA2587867C true CA2587867C (fr) | 2015-06-23 |
Family
ID=38663503
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2587867A Active CA2587867C (fr) | 2006-05-08 | 2007-05-07 | Dispositif de securite de reseau |
Country Status (1)
Country | Link |
---|---|
CA (1) | CA2587867C (fr) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111695148B (zh) * | 2020-05-15 | 2023-07-04 | 浙江信网真科技股份有限公司 | 一种网络节点自学习的安全过滤方法及装置 |
CN113014590B (zh) * | 2021-03-08 | 2022-07-15 | 中电积至(海南)信息技术有限公司 | 一种加密流媒体网络流量的解密方法和装置 |
US11916950B1 (en) | 2021-04-12 | 2024-02-27 | Vmware, Inc. | Coordinating a distributed vulnerability network scan |
CN113127929B (zh) * | 2021-04-30 | 2024-03-01 | 天翼安全科技有限公司 | 数据脱敏方法、脱敏规则处理方法、装置、设备及存储介质 |
US11528317B1 (en) * | 2021-05-05 | 2022-12-13 | Vmware, Inc. | Proxy-enabled communication across network boundaries by self-replicating applications |
-
2007
- 2007-05-07 CA CA2587867A patent/CA2587867C/fr active Active
Also Published As
Publication number | Publication date |
---|---|
CA2587867A1 (fr) | 2007-11-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7890612B2 (en) | Method and apparatus for regulating data flow between a communications device and a network | |
US9197628B1 (en) | Data leak protection in upper layer protocols | |
US9648029B2 (en) | System and method of active remediation and passive protection against cyber attacks | |
KR101554809B1 (ko) | 프로토콜 핑거프린팅 및 평판 상관을 위한 시스템 및 방법 | |
Biju et al. | Cyber attacks and its different types | |
US20030037258A1 (en) | Information security system and method` | |
Giani et al. | Data exfiltration and covert channels | |
CA2587867C (fr) | Dispositif de securite de reseau | |
Carter et al. | Intrusion prevention fundamentals | |
SOX | This White Paper | |
Venkatesh et al. | Identification and isolation of crypto ransomware using honeypot | |
Shaikh et al. | Exploring recent challenges in cyber security and their solutions | |
Berchi et al. | Security Issues in Cloud-based IoT Systems | |
Shukla et al. | Security Analysis of the Cyber Crime | |
Muttoo et al. | Analysing security checkpoints for an integrated utility-based information system | |
Banday et al. | A study of Indian approach towards cyber security | |
Vakil et al. | Cyber Attacks: Detection and Prevention | |
Khanday et al. | Intrusion Detection Systems for Trending Cyberattacks | |
Kolawole et al. | Practical Approaches to Securing an IT Environment | |
Pathak | The Review of Terms and Concepts used to Understand Cybercrime to Safeguard Ourselves from Cybercriminals. | |
Geogen et al. | Mobile malware | |
Kumar | The cram of Network Security with Its stabbing Attacks and likely Security Mechanisms | |
Bhosle et al. | Technical Review on Network Security | |
Harrison et al. | A protocol layer survey of network security | |
Ali et al. | Cyber Security: Challenges, Threats and Protective Measures of an Organization |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request |