🗃️
PropScreen
search
Ctrlk
  • PropScreen Overview
  • Introduction
    • The Problem
    • Problem Importance and Impact
    • Solution Overviewchevron-right
  • System Architecture
    • Core Components of Propscreenchevron-right
      • PropScreen's Checks
      • Context Strings Database
      • Hashed Organizational Sensitive Information
      • Interdiction Log Database (Reports)
    • Architecture Overview
    • Sequence Diagrams by Use Casechevron-right
  • Project Considerations
    • Threat Modelingchevron-right
    • Secure by Design
    • Alternative Solutionschevron-right
    • PropScreen's LLM Implementation
  • The Proof of Concept
    • Demo Video
    • Try the Proof of Concept
  • Going Forward...
    • SIEM Integration
    • Role Based Access Control Dependent Response Filtering
    • The Good, The Bad, and the Learning
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. System Architecture

Core Components of Propscreen

PropScreen's Checkschevron-rightContext Strings Databasechevron-rightHashed Organizational Sensitive Informationchevron-rightInterdiction Log Database (Reports)chevron-right
PreviousUser Personaschevron-leftNextPropScreen's Checkschevron-right