首页> 外文学位 >Is Active Cyber Defense the Answer?
【24h】

Is Active Cyber Defense the Answer?

机译:主动网络防御是答案吗?

获取原文
获取原文并翻译 | 示例

摘要

The purpose of this project is to gauge current cyber threats to critical infrastructure organizations and what actions are needed to mitigate those threats. Passive cyber defense methods have been the industry standard over the last two decades. This project aims to determine why passive defense has failed and what active methods could be viable and effective. Cyber-attacks have begun targeting critical infrastructure using complex malware with destructive motives. Current passive defensive measures have not positioned defenders to be able to steadily mitigate advanced threats to their networks. Active cyber defense has seen a growing interest within various organizations that provides more interaction with cyber threats internally and externally.;This project outlines four categories that incorporate active measures: intelligence operations, internal active defense, active decoys, and counterattacks. The heavy use of destructive malware and various evasion techniques by attackers requires defenders to be more active in defense methods such as threat hunting. Also, intelligence gathered by law enforcement, intelligence agencies, security firms, and critical sector organizations themselves must be shared amongst similar industries. Counterattacks such as hackbacks and rescue missions had limited positive results and thus are not recommended for independent organizations. However, all active methods should be considered with the resources provided by trusted external partners such as government, law enforcement, intelligence agencies, and security firms. The biggest challenge of active cyber defense is the ability to attribute an attack to an adversary. The needed time and effort for attribution are too difficult for counterattacks to be a viable and efficient method for independent organizations.
机译:该项目的目的是评估当前对关键基础架构组织的网络威胁以及需要采取哪些措施来缓解这些威胁。在过去的二十年中,被动网络防御方法一直是行业标准。该项目旨在确定被动防御失败的原因,以及哪种主动方法可能是可行和有效的。网络攻击已开始使用具有破坏性动机的复杂恶意软件来针对关键基础架构。当前的被动防御措施尚未使防御者定位为能够稳定地缓解对其网络的高级威胁。主动网络防御在各个组织中日益引起关注,这些组织在内部和外部提供了更多与网络威胁的互动。;该项目概述了包含主动措施的四个类别:情报行动,内部主动防御,主动诱饵和反击。攻击者大量使用破坏性恶意软件和各种逃避技术,要求防御者在防御方法(如威胁搜寻)中更加活跃。同样,执法机构,情报机构,安全公司和关键部门组织本身收集的情报必须在类似行业之间共享。诸如黑客攻击和营救任务之类的反击取得的积极成果有​​限,因此不建议独立组织使用。但是,应将所有有效方法与可信赖的外部合作伙伴(例如政府,执法机构,情报机构和安全公司)提供的资源一起考虑。主动网络防御的最大挑战是将攻击归因于对手的能力。对于反击来说,归因所需要的时间和精力太困难了,因此对于独立组织来说,这是不可行和有效的方法。

著录项

  • 作者

    Lloyd, William.;

  • 作者单位

    Utica College.;

  • 授予单位 Utica College.;
  • 学科 Information technology.;Computer science.
  • 学位 M.S.
  • 年度 2018
  • 页码 72 p.
  • 总页数 72
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号