A Public Response to Emerging Exploits Changing the State of HLS Cyber Capacity: Moving to Threat-based Active Defense

ثبت نشده
چکیده

Leveraging new techniques to enhance the collective cyber defenses of the United States " To secure ourselves against defeat lies in our own hands, but the opportunity of defeating the enemy is provided by the enemy himself. "-Sun Tzu Introduction The Public Response to Emerging Exploits (PROTeX) concept uses existing capabilities and capacity to focus on three central enablers for a more effective national cyber defense system: • Connected BLOCKINnetworks: BLOCKINShortcomings BLOCKINin BLOCKINcybersecurity BLOCKINpresent BLOCKINa BLOCKINnational BLOCKINthreat BLOCKINthat BLOCKINaffects government, private industry, academia, and individual citizens, potentially creating great mutual motivation BLOCKINfor BLOCKINaction.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Adaptive Attacker Strategy Development Against Moving Target Cyber Defenses

A model of strategy formulation is used to study how an adaptive attacker learns to overcome a moving target cyber defense. The attacker-defender interaction is modeled as a game in which a defender deploys a temporal platform migration defense. Against this defense, a population of attackers develop strategies specifying the temporal ordering of resource investments that bring targeted zero-da...

متن کامل

Entrepreneurial University, a Necessity for Knowledge-Based Economy; Evaluation and Explanation of Entrepreneurial Capacity of University of Mazandaran

Entrepreneurship, is an idea and a process in which an individual or group identifies new opportunities and exploits them successfully. Universities as knowledge producing and knowledge distributing institutions play a greater role in industrial innovation. In fact the emergence of entrepreneurial university is a response to the increasing importance of knowledge in national and regional system...

متن کامل

Application of Stochastic Optimal Control, Game Theory and Information Fusion for Cyber Defense Modelling

The present paper addresses an effective cyber defense model by applying information fusion based game theoretical approaches‎. ‎In the present paper, we are trying to improve previous models by applying stochastic optimal control and robust optimization techniques‎. ‎Jump processes are applied to model different and complex situations in cyber games‎. ‎Applying jump processes we propose some m...

متن کامل

Emerging Psychedelics: A Systematic Review of Synthetic Cannabinoids

Objective: In recent years, the advent of synthetic cannabinoids, deceptive advertising and cyber sales has led young people to use them. The United Nations Office on Drugs and Crime (UNODC) has identified the prevalence of using these compounds as a major public health challenge. The aim of the present study was to systematically review synthetic cannabinoids. Method: This study was a descript...

متن کامل

Application of Cybernetics and Control Theory for a New Paradigm in Cybersecurity

A significant limitation of current cyber security research and techniques is its reactive and applied nature. This leads to a continuous ‘cyber cycle’ of attackers scanning networks, developing exploits and attacking systems, with defenders detecting attacks, analyzing exploits and patching systems. This reactive nature leaves sensitive systems highly vulnerable to attack due to un-patched sys...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012