SOS :: Security Operation Space
21 января, понедельник, 00:00
|
Hot News:
Издатель документа:
 
Тип документа:
Тематика:
Год публикации с: по:
22.02.2018 г.
pdf
1.37 M

Artificial intelligence and machine learning capabilities are growing at an unprecedented rate. These technologies have many widely beneficial applications, ranging from machine translation to medical image analysis. Countless more such applications are being developed and can be expected over the long term. Less attention has historically been paid to the ways in which artificial intelligence can be used maliciously. This report surveys the landscape of potential security threats from malicious uses of artificial intelligence technologies, and proposes ways to better forecast, prevent, and mitigate these threats.

Издатель: Other Тип: обзор / отчёт Тематика: кибербезопасность
14.02.2018 г.
pdf
0.99 M

Competition among countries will increase in the coming year as major powers and regional aggressors exploit complex global trends while adjusting to new priorities in US foreign policy. The risk of interstate conflict, including among great powers, is higher than at any time since the end of the Cold War. The most immediate threats of regional interstate conflict in the next year come from North Korea and from Saudi-

Iranian use of proxies in their rivalry. At the same time, the threat of state and onstate use of weapons of mass destruction will continue to grow.

Издатель: Other Тип: обзор / отчёт Тематика: информационная безопасность
13.02.2018 г.
pdf
0.98 M

Part I. The Cyber-Kill Chain.

Издатель: Other Тип: организационный (общего характера) Тематика: киберзащита
13.02.2018 г.
pdf
1.53 M

Trust in System’s ability to Execute Trusted Behavior Only and to Prevent Malicious Attacks with objective to Protect Information, Assets & Services Against Compromise

Издатель: Other Тип: стандарт организации Тематика: информационная безопасность
13.02.2018 г.
pdf
432.42 K

This paper provides the conceptual basis of the Cyber Green Initiative (CGI), and includes a description of its rationale, key definitions, existing efforts, and its proposed mission. CGI’s core focus is on tapping the collaborative potential of stakeholders in cyberspace through promoting the concept of “cyber health” and establishing a reliable platform for generating cross-­‐comparable statistics. CGI will focus on the following core tasks: establishing reliable cross-­‐comparable statistics and information sharing mechanisms, enabling operational remediation efforts, and providing insight into systemic risk conditions in the cyber ecosystem.

Издатель: Other Тип: рекомендация Тематика: кибербезопасность
13.02.2018 г.
pdf
1.55 M

AITRI SEMINAR ON NEW TECHNOLOGY RISKS AND CYBER SECURITY, KUALA LUMPUR

Издатель: Other Тип: обзор / отчёт Тематика: информационная безопасность
13.02.2018 г.
pdf
1.31 M

Cyberattacks and defenses against them are conducted in complex environments, with numerous factors contributing to attack success and mission impacts. Network topology, host configurations, vulnerabilities, firewall settings, intrusion detection systems, mission dependencies, and many other elements can play parts. To go beyond rudimentary assessments of security posture, organizations need to merge isolated data into higher-level knowledge of network-wide attack vulnerability and mission readiness in the face of cyber threats.

Издатель: MITRE (США) Тип: рекомендация Тематика: информационная безопасность
13.02.2018 г.
pdf
130.17 K

Издатель: ISACA / АИСАК Тип: организационный (общего характера) Тематика: кибербезопасность
13.02.2018 г.
pdf
1.93 M

This two-year project in building the foundations for predictive cyber analytics was sponsored by the National Institute of Standards and Technology NIST (Project Leads: Mr. Jon Boyens; and Ms. Celia Paulsen); and the General Services Administration (Project Leads: Ms. Angela Smith and Mr. Emile Monette).

Издатель: NIST (США) Тип: обзор / отчёт Тематика: киберзащита
13.02.2018 г.
pdf
1.24 M

Missions, business functions, organizations, and nations are increasingly dependent on cyberspace. The need for cyber resiliency—for information and communications systems and those who depend on them to be resilient in the face of persistent, stealthy, and sophisticated attacks focused on cyber resources—is increasingly recognized. While resilience is sometimes described as an emergent property, resilience in the face of cyber threats must be engineered.

Издатель: MITRE (США) Тип: рекомендация Тематика: кибербезопасность
15:15
15:15
13:15
13:15
13:02
12:15
11:15
09:15
08:15
07:15
07:15
14:54
09:09
08:09
16:40
13:57
13:15
12:16


© 2013—2019 SOS :: Security Operation Space (Пространство Операций Безопасности)  // Обратная связь  | 0.135
Использование любых материалов, размещённых на сайте, разрешается при условии ссылки на sos.net.ua.