DEMOCRATIZING CYBER SECURITY

Brand Owner Address Description
DEMOCRATIZING CYBERSECURITY Assura, Inc. Suite 202 7814 Carousel Lane Ashland VA 23294 DEMOCRATIZING CYBER SECURITY;Business risk management services, namely, continuity of operations business planning; business consultation in the field of turnaround and crisis management; business enterprise risk management; business risk management services in the fields of information technology and information technology enterprises;information technology consulting services, namely, regulatory compliance consulting with the information and technology security and privacy requirements of the HIPAA and HITECH Acts;CYBERSECURITY;cybersecurity services, namely, updating of computer software relating to computer security and prevention of computer risks; computer cyber security services, namely, hard drive erasure; computer cybersecurity consultancy; computer cybersecurity services, namely, restricting access to and by computer networks to and of undesired web sites, media, individuals and facilities; continuity of information technology services planning, namely, planning of information technology systems to ensure continuity of information technology; information technology consultation in the field of turnaround and crisis management;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Different levels of security are provided in a security system so that users can decide the security level of their own communications. Users can choose a low level of security and maintain the security overhead as low as possible. Alternatively, they can choose higher levels of security with attendant increases in security overhead. The different levels of security are created by the use of one or more of two keys: an encryption key is used to encrypt plaintext data in a delta and a message authentication key is used to authenticate and insure integrity of the data. Two keys are used to avoid re-encrypting the encrypted data for each member of the telespace. In one embodiment, the security level is determined when a telespace is created and remains fixed through out the life of the telespace. For a telespace, the security level may range from no security at all to security between the members of the telespace and outsiders to security between pairs of members of the telespace. In another embodiment, subgroups called "tribes" can be formed within a telespace and each tribe adopts the security level of the telespace in which it resides.