科技报告详细信息
Assessment of current cybersecurity practices in the public domain : cyber indications and warnings domain.
Hamlet, Jason R. ; Keliiaa, Curtis M.
关键词: COMPUTER NETWORKS;    SECURITY;    SABOTAGE;    MITIGATION;    INTERNET;    PERFORMANCE Computer security.;    Computer networks-Security measures.;    National security-Computer network resources.;    Computer Information Security;   
DOI  :  10.2172/992337
RP-ID  :  SAND2010-4765
PID  :  OSTI ID: 992337
Others  :  TRN: US201022%%366
学科分类:数学(综合)
美国|英语
来源: SciTech Connect
PDF
【 摘 要 】

This report assesses current public domain cyber security practices with respect to cyber indications and warnings. It describes cybersecurity industry and government activities, including cybersecurity tools, methods, practices, and international and government-wide initiatives known to be impacting current practice. Of particular note are the U.S. Government's Trusted Internet Connection (TIC) and 'Einstein' programs, which are serving to consolidate the Government's internet access points and to provide some capability to monitor and mitigate cyber attacks. Next, this report catalogs activities undertaken by various industry and government entities. In addition, it assesses the benchmarks of HPC capability and other HPC attributes that may lend themselves to assist in the solution of this problem. This report draws few conclusions, as it is intended to assess current practice in preparation for future work, however, no explicit references to HPC usage for the purpose of analyzing cyber infrastructure in near-real-time were found in the current practice. This report and a related SAND2010-4766 National Cyber Defense High Performance Computing and Analysis: Concepts, Planning and Roadmap report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

【 预 览 】
附件列表
Files Size Format View
RO201704240001196LZ 495KB PDF download
  文献评价指标  
  下载次数:9次 浏览次数:53次