Search results for "Architectural Pattern"

Showing 1 - 10 of 20 results
Sort by: Relevance|Date

TOPIC transaction monitoring

the monitoring of financial and payment systems to identify patterns of transactions which may indicate suspicious activity.

  • Wireless Networking (Architectural Pattern 12)

    Guidance08 Aug 2016TopicsArchived guidance, CESG archive

    Archive content originally produced by CESG that has not yet been absorbed into the new NCSC web pages.

    Proposed architectures for managing the security risks of wireless networking.

  • Internet Gateways (Architectural Pattern 17)

    Guidance08 Aug 2016TopicsArchived guidance, CESG archive

    Archive content originally produced by CESG that has not yet been absorbed into the new NCSC web pages.

    This Guidance describes security controls which can be used to secure an organisation’s access to the Internet.

  • Serving Web Content (Architectural Pattern 10)

    Guidance08 Aug 2016TopicsArchived guidance, CESG archive

    Archive content originally produced by CESG that has not yet been absorbed into the new NCSC web pages.

    Recommended architecture for the management and deployment of web content.

  • Pattern: Safely Importing Data

    Guidance16 Jul 2018TopicsIT infrastructure, Data in transit, Malware protection, Monitoring

    An architecture pattern for safely importing data into a system from an external source.

  • Walled Garden for Remote Access (Architectural Pattern 2)

    Guidance08 Aug 2016TopicsArchived guidance, CESG archive

    Archive content originally produced by CESG that has not yet been absorbed into the new NCSC web pages.

    How businesses can expose applications to remote endpoints without giving those endpoints full access to the core network.

  • Cyber security architect

    How the NCSC thinks about security architecture

    Blog post05 Apr 2018AuthorRichard CTopicsVulnerabilities, The NCSC, New talent

    Richard C explains how an understanding of vulnerabilities - and their exploitation - informs how the NCSC assesses the security of computer systems.

  • Security Design Principles for Digital Services

    Guidance08 Aug 2016TopicsDesign and configuration, Digital services

  • Import data not malware

    Import data, not malware

    Blog post16 Jul 2018AuthorRichard CTopicsIT infrastructure, Malware protection

    Richard C introduces new guidance on safe, malware-free data import

  • EUD Security Guidance: Samsung devices with Knox Workspace

    Guidance15 Feb 2018TopicsEnd user technology, End user device

    Secure configuration for Samsung devices running Knox Workspace 2.8 and higher

  • Understanding system-driven risk management

    Guidance13 Dec 2017TopicsRisk management

    The principles of system-driven risk management in cyber security.