Back to Results
First PageMeta Content
Data / Internet protocols / Unidirectional network / User Datagram Protocol / Transmission Control Protocol / File Transfer Protocol / Communications protocol / Diode / Point-to-point protocol / Computing / Internet / Internet standards


Protecting confidential information using data diodes technology explained
Add to Reading List

Document Date: 2014-09-09 14:21:30


Open Document

File Size: 709,74 KB

Share Result on Facebook

IndustryTerm

upstream and downstream network / a lot of technology / confidential information using data diodes technology / protocol break solution / solution / downstream proxy server / antivirus solution / printing / upstream network / portable storage media / possible technology / portable media usage / data diode protocol / upstream proxy server / specialist security software / portable media / chosen protocol / control server / downstream network / streaming protocols / internet information / strict portable media policy / downstream networks / printing documents / scenario internet / unidirectional network / /

Organization

C.I.A. / /

Person

Colin Robbins / Wouter Teepe / /

Position

catcher / /

Technology

TCP protocol / unidirectional UDP protocols / confidential information using data diodes technology / UDP protocol / a lot of technology / load balancing / proxy server / confidential information using data diodes Protocol / network Computer / ASCII / CCTV streaming protocols / Modifying protocols / HTTP / Data Diode Protocol / caching / UDP / chosen protocol / PDF / 5 Protocol / /

URL

http /

SocialTag