Distributed cybersecurity strategy, applying intelligence operation concept through data collection and analysis

Detalles Bibliográficos
Autor Principal: Gallardo Urbini, Ignacio Martín
Otros autores o Colaboradores: Bazán, Patricia Alejandra, Venosa, Paula, Río, Nicolás del
Formato: Capítulo de libro
Lengua:inglés
Temas:
Acceso en línea:http://sedici.unlp.edu.ar/handle/10915/121564
Consultar en el Cátalogo
Resumen:This document presents a line of doctoral research that proposes a cybersecurity strategy that has not been formally standardized up to now, based on knowledge of defense intelligence operations, and applying a dynamic approach, in a context of threat risk, anticipating its effectiveness . In this way, change the current approach, leaving aside the old concept of "walled" defense, for a more innovative one, where information collectors or "spies" infiltrate "unknown terrain" or external networks to extract data and information, learn from context, analyze and detect patterns, be willing to share the knowledge, and then be able to make defensive, deterrent, or offensive decisions in real time.
Notas:Formato de archivo PDF. -- Este documento es producción intelectual de la Facultad de Informática - UNLP (Colección BIPA/Biblioteca)
Descripción Física:1 archivo (900,0 kB)

MARC

LEADER 00000naa a2200000 a 4500
003 AR-LpUFIB
005 20250311170510.0
008 230201s2021 xx o 000 0 eng d
024 8 |a DIF-M8317  |b 8537  |z DIF007610 
040 |a AR-LpUFIB  |b spa  |c AR-LpUFIB 
100 1 |a Gallardo Urbini, Ignacio Martín 
245 1 0 |a Distributed cybersecurity strategy, applying intelligence operation concept through data collection and analysis 
300 |a 1 archivo (900,0 kB) 
500 |a Formato de archivo PDF. -- Este documento es producción intelectual de la Facultad de Informática - UNLP (Colección BIPA/Biblioteca) 
520 |a This document presents a line of doctoral research that proposes a cybersecurity strategy that has not been formally standardized up to now, based on knowledge of defense intelligence operations, and applying a dynamic approach, in a context of threat risk, anticipating its effectiveness . In this way, change the current approach, leaving aside the old concept of "walled" defense, for a more innovative one, where information collectors or "spies" infiltrate "unknown terrain" or external networks to extract data and information, learn from context, analyze and detect patterns, be willing to share the knowledge, and then be able to make defensive, deterrent, or offensive decisions in real time. 
534 |a Jornadas de Cloud Computing, Big Data & Emerging Topics (9na : 2021 : La Plata, Argentina) 
650 4 |a BIG DATA 
650 4 |a SEGURIDAD Y PROTECCIÓN 
700 1 |a Bazán, Patricia Alejandra 
700 1 |a Venosa, Paula 
700 1 |a Río, Nicolás del 
856 4 0 |u http://sedici.unlp.edu.ar/handle/10915/121564 
942 |c CP 
952 |0 0  |1 0  |4 0  |6 A1177  |7 3  |8 BD  |9 83229  |a DIF  |b DIF  |d 2025-03-11  |l 0  |o A1177   |r 2025-03-11 17:05:10  |u http://catalogo.info.unlp.edu.ar/meran/getDocument.pl?id=2276  |w 2025-03-11  |y CP 
999 |c 57383  |d 57383