Ignacio Martin Gallardo Urbini, Paula Venosa, P. Bazán, Nicolas Del Rio
{"title":"应用情报作战理论的分布式网络安全战略","authors":"Ignacio Martin Gallardo Urbini, Paula Venosa, P. Bazán, Nicolas Del Rio","doi":"10.23919/cisti54924.2022.9820426","DOIUrl":null,"url":null,"abstract":"This document presents a line of doctoral research that proposes a cybersecurity strategy that has not been formally standardized up to date, based on knowledge of defense intelligence operations, and applying a combination of static and dynamic approaches, in a context of threat risk, anticipating its effectiveness. In this way, changing the current approach, leaving aside the old concept of \"walled\" defense, for a more innovative one, where information collectors or \"spies\" infiltrate \"unknown terrain\" or external networks to extract data and information, learn from context, analyze and detect patterns, be willing to share the knowledge, and then be able to make defensive deterrent, or offensive decisions in real-time.","PeriodicalId":187896,"journal":{"name":"2022 17th Iberian Conference on Information Systems and Technologies (CISTI)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Distributed Cybersecurity Strategy, applying the Intelligence Operations Theory\",\"authors\":\"Ignacio Martin Gallardo Urbini, Paula Venosa, P. Bazán, Nicolas Del Rio\",\"doi\":\"10.23919/cisti54924.2022.9820426\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This document presents a line of doctoral research that proposes a cybersecurity strategy that has not been formally standardized up to date, based on knowledge of defense intelligence operations, and applying a combination of static and dynamic approaches, in a context of threat risk, anticipating its effectiveness. In this way, changing the current approach, leaving aside the old concept of \\\"walled\\\" defense, for a more innovative one, where information collectors or \\\"spies\\\" infiltrate \\\"unknown terrain\\\" or external networks to extract data and information, learn from context, analyze and detect patterns, be willing to share the knowledge, and then be able to make defensive deterrent, or offensive decisions in real-time.\",\"PeriodicalId\":187896,\"journal\":{\"name\":\"2022 17th Iberian Conference on Information Systems and Technologies (CISTI)\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-06-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 17th Iberian Conference on Information Systems and Technologies (CISTI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/cisti54924.2022.9820426\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 17th Iberian Conference on Information Systems and Technologies (CISTI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/cisti54924.2022.9820426","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Distributed Cybersecurity Strategy, applying the Intelligence Operations Theory
This document presents a line of doctoral research that proposes a cybersecurity strategy that has not been formally standardized up to date, based on knowledge of defense intelligence operations, and applying a combination of static and dynamic approaches, in a context of threat risk, anticipating its effectiveness. In this way, changing the current approach, leaving aside the old concept of "walled" defense, for a more innovative one, where information collectors or "spies" infiltrate "unknown terrain" or external networks to extract data and information, learn from context, analyze and detect patterns, be willing to share the knowledge, and then be able to make defensive deterrent, or offensive decisions in real-time.