Device for and Method of Computer Intrusion Anticipation, Detection, and Remediation
TBMG-27801
11/01/2017
- Content
Initially, relatively powerful computers were constructed as unique mainframes operated by larger corporations on isolated networks. Then, computers with modest amounts of computing power were made available to individuals as standalone personal computers. The computing power of personal computers and the applications for which they could be used were increased by networking them with other computers throughout the world using ancillary devices (e.g., servers, routers, links, switches, hubs, etc.). An arrangement into which computer and ancillary devices are configured is called a topology. There are many different types of topologies (e.g., bus, ring, star, tree, mesh, etc.).
- Citation
- "Device for and Method of Computer Intrusion Anticipation, Detection, and Remediation," Mobility Engineering, November 1, 2017.