Fatiguing Data to Protect against Cyber Security Extortions: A counter-intelligence methodology

A. Vincent
{"title":"Fatiguing Data to Protect against Cyber Security Extortions: A counter-intelligence methodology","authors":"A. Vincent","doi":"10.3390/MOL2NET-04-05905","DOIUrl":null,"url":null,"abstract":"\"Now and recently, confab is less about preventing and stopping an attack, threat or exposure, and more about how swiftly you can detect that an attack is happening.\" There's a growing demand for security information and event management (SIEM) technologies and services, which gather and analyse security event big data that is used to manage threats. Big data offers the ability to analyse immense numbers of potential security events and make connections between them to create a prioritized list of threats. With big data, distinct data can be connected, which allows cyber security professionals to take a proactive approach that prevents attacks. Advanced Persistent Threats (APTs) are also used to find and identify where threats are coming from. Integrated security architecture and power of automated information collection and sharing between many security systems, called “Counter-intelligence” to solve the strategic short comings. “Counter intelligence” translates to new security product architecture into a data collection backbone feeding a centralized repository used to correlate security anomalies from, across multiple systems. This paper illustrates the new counter intelligence approach to defend against future cyber security threats by applying modern risk analysis and mitigation methods to protect users’ private data from big data.","PeriodicalId":20475,"journal":{"name":"Proceedings of MOL2NET 2018, International Conference on Multidisciplinary Sciences, 4th edition","volume":"61 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of MOL2NET 2018, International Conference on Multidisciplinary Sciences, 4th edition","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3390/MOL2NET-04-05905","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

"Now and recently, confab is less about preventing and stopping an attack, threat or exposure, and more about how swiftly you can detect that an attack is happening." There's a growing demand for security information and event management (SIEM) technologies and services, which gather and analyse security event big data that is used to manage threats. Big data offers the ability to analyse immense numbers of potential security events and make connections between them to create a prioritized list of threats. With big data, distinct data can be connected, which allows cyber security professionals to take a proactive approach that prevents attacks. Advanced Persistent Threats (APTs) are also used to find and identify where threats are coming from. Integrated security architecture and power of automated information collection and sharing between many security systems, called “Counter-intelligence” to solve the strategic short comings. “Counter intelligence” translates to new security product architecture into a data collection backbone feeding a centralized repository used to correlate security anomalies from, across multiple systems. This paper illustrates the new counter intelligence approach to defend against future cyber security threats by applying modern risk analysis and mitigation methods to protect users’ private data from big data.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
防止网络安全勒索的疲劳数据:一种反情报方法
“现在和最近,confble不再是关于预防和阻止攻击、威胁或暴露,而是关于你能多快地发现攻击正在发生。”对安全信息和事件管理(SIEM)技术和服务的需求不断增长,这些技术和服务收集和分析用于管理威胁的安全事件大数据。大数据提供了分析大量潜在安全事件的能力,并在它们之间建立联系,以创建威胁的优先级列表。有了大数据,不同的数据可以连接起来,这使得网络安全专业人员能够采取主动的方法来防止攻击。高级持续性威胁(apt)还用于查找和识别威胁的来源。集成的安全体系结构和强大的自动信息收集与共享功能在多个安全系统之间实现,称为“反情报”解决战略短板。“反智能”将新的安全产品架构转换为数据收集主干,为用于关联来自多个系统的安全异常的集中存储库提供数据。本文阐述了新的反情报方法,通过应用现代风险分析和缓解方法来保护用户的私人数据免受大数据的影响,以防御未来的网络安全威胁。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
PANELFIT-LAWSci-02 Workshop: H2020 Challenges in Law, Technology, Life, and Social Sciences Characterization and overexpression of a glucanase from a newly isolated B. subtilis strain MOL2NET: FROM MOLECULES TO NETWORKS (PROC. BOOK), ISBN: 978-3-03842-820-6, 2019, Vol. 4, 2985 pp. Analysis of chemical composition of Cissus incisa leaves by GC/MS Machine learning techniques and the identification of new potentially active compounds against Leishmania infantum.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1