DEFCON Behind the Scene

نویسنده

  • Jeff Moss
چکیده

Jeff Moss took the audience on a behind-the-scenes look at cybersecurity policy and practice, starting from the origins of DEFCON, and continuing on to present day Washington, DC policy-making as ICANN’s chief security officer. Two decades ago, when the first DEFCON was taking shape, part of the goal was to get as many computer security-focused individuals in one place in order to encourage the open exchange of knowledge, at a time when there were no better ways to do so. To that end, DEFCON was the first open hacker conference, eschewing the invitation-only model of similar contemporary events. And, it turned out, not only security professionals and hackers were (and still are) interested in this kind of knowledge exchange, but governments were as well: intelligence and counter-intelligence agents have been spotted at DEFCON from the very early days and continue to appear year after year.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DEFCON: High-Performance Event Processing with Information Security

In finance and healthcare, event processing systems handle sensitive data on behalf of many clients. Guaranteeing information security in such systems is challenging because of their strict performance requirements in terms of high event throughput and low processing latency. We describe DEFCON, an event processing system that enforces constraints on event flows between event processing units. ...

متن کامل

Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack

Defcon’s Capture the Flag (CtF) game is the largest open computer security hacking game. This year’s CtF hat rules that made it particularly difficult to be a successful defender. We entered an Immunix server, comprised of five years of IA&S, OASIS, FTN, and CHATS technologies, to see whether this system could survive sustained attack from determined experts. We describe our experience survivin...

متن کامل

Center The USENIX Association Staff External Reviewers

In finance and healthcare, event processing systems handle sensitive data on behalf of many clients. Guaranteeing information security in such systems is challenging because of their strict performance requirements in terms of high event throughput and low processing latency. We describe DEFCON, an event processing system that enforces constraints on event flows between event processing units. ...

متن کامل

Evolving Behaviour Trees for the Commercial Game DEFCON

Behaviour trees provide the possibility of improving on existing Artificial Intelligence techniques in games by being simple to implement, scalable, able to handle the complexity of games, and modular to improve reusability. This ultimately improves the development process for designing automated game players. We cover here the use of behaviour trees to design and develop an AI-controlled playe...

متن کامل

Combining Artificial Intelligence Methods : Automating the Playing of DEFCON by Robin Baumgarten MSc in Advanced Computing Individual Project Report

In the commercial video game industry, computer opponents that act intelligently are increasingly important, especially as better graphical effects decline to serve as a driving force for the commercial success of a game. The methods used by developers to create these bots are often obsolete and struggle to scale with the complexity of modern games. Nonetheless the use of modern artificial inte...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012