DEFCON Behind the Scene
نویسنده
چکیده
Jeff Moss took the audience on a behind-the-scenes look at cybersecurity policy and practice, starting from the origins of DEFCON, and continuing on to present day Washington, DC policy-making as ICANN’s chief security officer. Two decades ago, when the first DEFCON was taking shape, part of the goal was to get as many computer security-focused individuals in one place in order to encourage the open exchange of knowledge, at a time when there were no better ways to do so. To that end, DEFCON was the first open hacker conference, eschewing the invitation-only model of similar contemporary events. And, it turned out, not only security professionals and hackers were (and still are) interested in this kind of knowledge exchange, but governments were as well: intelligence and counter-intelligence agents have been spotted at DEFCON from the very early days and continue to appear year after year.
منابع مشابه
DEFCON: High-Performance Event Processing with Information Security
In finance and healthcare, event processing systems handle sensitive data on behalf of many clients. Guaranteeing information security in such systems is challenging because of their strict performance requirements in terms of high event throughput and low processing latency. We describe DEFCON, an event processing system that enforces constraints on event flows between event processing units. ...
متن کاملDefcon Capture the Flag: Defending Vulnerable Code from Intense Attack
Defcon’s Capture the Flag (CtF) game is the largest open computer security hacking game. This year’s CtF hat rules that made it particularly difficult to be a successful defender. We entered an Immunix server, comprised of five years of IA&S, OASIS, FTN, and CHATS technologies, to see whether this system could survive sustained attack from determined experts. We describe our experience survivin...
متن کاملCenter The USENIX Association Staff External Reviewers
In finance and healthcare, event processing systems handle sensitive data on behalf of many clients. Guaranteeing information security in such systems is challenging because of their strict performance requirements in terms of high event throughput and low processing latency. We describe DEFCON, an event processing system that enforces constraints on event flows between event processing units. ...
متن کاملEvolving Behaviour Trees for the Commercial Game DEFCON
Behaviour trees provide the possibility of improving on existing Artificial Intelligence techniques in games by being simple to implement, scalable, able to handle the complexity of games, and modular to improve reusability. This ultimately improves the development process for designing automated game players. We cover here the use of behaviour trees to design and develop an AI-controlled playe...
متن کاملCombining Artificial Intelligence Methods : Automating the Playing of DEFCON by Robin Baumgarten MSc in Advanced Computing Individual Project Report
In the commercial video game industry, computer opponents that act intelligently are increasingly important, especially as better graphical effects decline to serve as a driving force for the commercial success of a game. The methods used by developers to create these bots are often obsolete and struggle to scale with the complexity of modern games. Nonetheless the use of modern artificial inte...
متن کامل