Distributed cybersecurity strategy, applying intelligence operation concept through data collection and analysis
Gallardo Urbini, Ignacio Martín
Distributed cybersecurity strategy, applying intelligence operation concept through data collection and analysis - 1 archivo (900,0 kB)
Formato de archivo PDF. -- Este documento es producción intelectual de la Facultad de Informática - UNLP (Colección BIPA/Biblioteca)
This document presents a line of doctoral research that proposes a cybersecurity strategy that has not been formally standardized up to now, based on knowledge of defense intelligence operations, and applying a dynamic approach, in a context of threat risk, anticipating its effectiveness . In this way, change the current approach, leaving aside the old concept of "walled" defense, for a more innovative one, where information collectors or "spies" infiltrate "unknown terrain" or external networks to extract data and information, learn from context, analyze and detect patterns, be willing to share the knowledge, and then be able to make defensive, deterrent, or offensive decisions in real time.
DIF-M8317
BIG DATA
SEGURIDAD Y PROTECCIÓN
Distributed cybersecurity strategy, applying intelligence operation concept through data collection and analysis - 1 archivo (900,0 kB)
Formato de archivo PDF. -- Este documento es producción intelectual de la Facultad de Informática - UNLP (Colección BIPA/Biblioteca)
This document presents a line of doctoral research that proposes a cybersecurity strategy that has not been formally standardized up to now, based on knowledge of defense intelligence operations, and applying a dynamic approach, in a context of threat risk, anticipating its effectiveness . In this way, change the current approach, leaving aside the old concept of "walled" defense, for a more innovative one, where information collectors or "spies" infiltrate "unknown terrain" or external networks to extract data and information, learn from context, analyze and detect patterns, be willing to share the knowledge, and then be able to make defensive, deterrent, or offensive decisions in real time.
DIF-M8317
BIG DATA
SEGURIDAD Y PROTECCIÓN