Information Security Associates May 1980 - Dec 1988
Vice President
R J Heffernan Associates May 1980 - Dec 1988
President
F.g Mason Engineering Oct 1966 - May 1980
Manager Information and Telecommunications Security Consulting
Skills:
Developing Strategies To Manage Business Risk From Mind To Market Information Assets Protection Information Security Instructor Basic and Advanced Tscm Technical Surveillance Countermeasures Reputation Security Operations Private Investigations Assess and Manage Risks To Ipr Physical Security Certified In Ct Pat Audit Security Consulting Tscm Access Control Workplace Violence Author Identify Security Training Risk Assessment Business Continuity Program Management Risk Management Executive Protection Expert Witness Corporate Security Former Member American Society For Industrial Security Policy Security Management Security Audits Asis Protection of Assets Manual Author Information Security Guideline Brands Protection Management Vulnerability Assessment Tscm Technical Surveillance Countermeasures Advisory Board National Counterintelligence Center Investigation Economic/Industrial Espionage U.s. House Judiciary Committee Surveillance Revenue Flow
- Hartford CT, US Mathew S. Bryant - Portland CT, US Richard J. Heffernan - Hebron CT, US Leonard A. Mariani - Mont Clair NJ, US Jonathan Musoke - Farmington CT, US Jeffrey F. Carlson - Ivoryton CT, US David Klatte - Acton MA, US
International Classification:
H04L 29/06 H04L 12/26
Abstract:
A system includes a network interface, at least one processing device, and at least one memory device. The at least one memory device stores instructions that when executed result in initiating creation of a single-use targeted link that provides access to a restricted access data entry system and serves the single-use targeted link through the network interface to a computer system of a targeted user with a time validity constraint. An access request received at the restricted access data entry system through the single-use targeted link is verified as being received within the time validity constraint. A network traffic throttling control reduces network traffic volume received through the single-use targeted link based on determining that the network traffic volume exceeds a traffic volume threshold. An identity control at the restricted access data entry system is applied to confirm entry of at least one identifying characteristic that matches the targeted user.
Richard Heffernan (1967-1971), John Fray (1997-2001), Yvette Prince (1983-1987), Robert Prince (1983-1987), Pat Daley (1968-1972), Karen Ferris (2003-2007)