{"title":"防止网络安全勒索的疲劳数据:一种反情报方法","authors":"A. Vincent","doi":"10.3390/MOL2NET-04-05905","DOIUrl":null,"url":null,"abstract":"\"Now and recently, confab is less about preventing and stopping an attack, threat or exposure, and more about how swiftly you can detect that an attack is happening.\" There's a growing demand for security information and event management (SIEM) technologies and services, which gather and analyse security event big data that is used to manage threats. Big data offers the ability to analyse immense numbers of potential security events and make connections between them to create a prioritized list of threats. With big data, distinct data can be connected, which allows cyber security professionals to take a proactive approach that prevents attacks. Advanced Persistent Threats (APTs) are also used to find and identify where threats are coming from. Integrated security architecture and power of automated information collection and sharing between many security systems, called “Counter-intelligence” to solve the strategic short comings. “Counter intelligence” translates to new security product architecture into a data collection backbone feeding a centralized repository used to correlate security anomalies from, across multiple systems. This paper illustrates the new counter intelligence approach to defend against future cyber security threats by applying modern risk analysis and mitigation methods to protect users’ private data from big data.","PeriodicalId":20475,"journal":{"name":"Proceedings of MOL2NET 2018, International Conference on Multidisciplinary Sciences, 4th edition","volume":"61 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Fatiguing Data to Protect against Cyber Security Extortions: A counter-intelligence methodology\",\"authors\":\"A. Vincent\",\"doi\":\"10.3390/MOL2NET-04-05905\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\\\"Now and recently, confab is less about preventing and stopping an attack, threat or exposure, and more about how swiftly you can detect that an attack is happening.\\\" There's a growing demand for security information and event management (SIEM) technologies and services, which gather and analyse security event big data that is used to manage threats. Big data offers the ability to analyse immense numbers of potential security events and make connections between them to create a prioritized list of threats. With big data, distinct data can be connected, which allows cyber security professionals to take a proactive approach that prevents attacks. Advanced Persistent Threats (APTs) are also used to find and identify where threats are coming from. Integrated security architecture and power of automated information collection and sharing between many security systems, called “Counter-intelligence” to solve the strategic short comings. “Counter intelligence” translates to new security product architecture into a data collection backbone feeding a centralized repository used to correlate security anomalies from, across multiple systems. This paper illustrates the new counter intelligence approach to defend against future cyber security threats by applying modern risk analysis and mitigation methods to protect users’ private data from big data.\",\"PeriodicalId\":20475,\"journal\":{\"name\":\"Proceedings of MOL2NET 2018, International Conference on Multidisciplinary Sciences, 4th edition\",\"volume\":\"61 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of MOL2NET 2018, International Conference on Multidisciplinary Sciences, 4th edition\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.3390/MOL2NET-04-05905\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of MOL2NET 2018, International Conference on Multidisciplinary Sciences, 4th edition","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3390/MOL2NET-04-05905","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Fatiguing Data to Protect against Cyber Security Extortions: A counter-intelligence methodology
"Now and recently, confab is less about preventing and stopping an attack, threat or exposure, and more about how swiftly you can detect that an attack is happening." There's a growing demand for security information and event management (SIEM) technologies and services, which gather and analyse security event big data that is used to manage threats. Big data offers the ability to analyse immense numbers of potential security events and make connections between them to create a prioritized list of threats. With big data, distinct data can be connected, which allows cyber security professionals to take a proactive approach that prevents attacks. Advanced Persistent Threats (APTs) are also used to find and identify where threats are coming from. Integrated security architecture and power of automated information collection and sharing between many security systems, called “Counter-intelligence” to solve the strategic short comings. “Counter intelligence” translates to new security product architecture into a data collection backbone feeding a centralized repository used to correlate security anomalies from, across multiple systems. This paper illustrates the new counter intelligence approach to defend against future cyber security threats by applying modern risk analysis and mitigation methods to protect users’ private data from big data.