نتایج جستجو برای: cyber defense
تعداد نتایج: 91877 فیلتر نتایج به سال:
Cyber has changed the scope of the Navy’s mission and is placing new strains on our diplomatic, warfighting, legal, and economic/budgetary processes. Cybersecurity processes and techniques are increasingly critical to our warfighting missions, but they can also inhibit the pace and potential for high impact, game-changing innovation. Throughout its history, the Navy has shown the ability of inn...
As large-scale Cyber attacks become more sophisticated, local network defenders should employ strength-in-numbers to achieve mission success. Group collaboration reduces individual efforts to analyze and assess network traffic. Network defenders must evolve from an isolated defense in sector policy and move toward a collaborative strength-in-numbers defense policy that rethinks traditional netw...
Data driven decisions derived from big data have assumed critical importance in many application domains, fueling the demand for collection, transportation, storage and processing of massive volumes of data at fast speeds. Such applications have made data a valuable resource that needs to be provided appropriate security. High value associated with big data sets has rendered the entire cyber in...
This paper presents an overview of the current state of cyber-security research and development (R&D), and a number of forward looking thoughts focusing on the challenges the community is likely to encounter in the next few years. The research ideas are organized in two categoriesthe first describes ideas that have already taken roots in the R&D community, whereas the second describes ideas tha...
The recent emergence of the targeted use of malware in cyber espionage versus industry requires a systematic review for better understanding of its impact and mechanism. This paper proposes a basic taxonomy to document major cyber espionage incidents, describing and comparing their impacts (geographic or political targets, origins and motivations) and their mechanisms (dropper, propagation, typ...
State sovereignty is born together with the independence of a country, as well in cyberspace. The state has cyberspace its territorial space so that it jurisdictional authority, but reality, there are unclear boundaries Indonesia today still dependence on foreign cyberinfrastructure, which causes high level cyber vulnerability and low resilience. local wisdom known "Gotong Royong," this concept...
CYBER attacks have risen in recent times. The attack on Sony Pictures by hackers, allegedly from North Korea, has caught worldwide attention. The President of the United States of America issued a statement and “vowed a US response after North Korea’s alleged cyber-attack”.This dangerous malware termed “wiper” could overwrite data and stop important execution processes. An analysis by the FBI s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید