Agile Autonomic Cyber Security

Agile Autonomic Cyber Security

Current security analysis, detection and protection systems are mainly static and manually intensive. The complexity of networked computing systems, their dynamic behavior, and the availability of many heterogeneous connected devices, make these tools incapable to detect and stop malicious attacks. In contrast to static, heuristic analysis, and control and management approaches, we have a need to pursue autonomic computing principles.


Autonomic computing refers to the self-management of complex distributed computing resources that can adapt to unpredictable changes with transparency to operators and users. Security is one of the four key elements of autonomic computing and includes proactive identification and protection from arbitrary cyber attacks. Topics include autonomic security regarding vulnerability assessments, intelligent sensors, encryption, services, and the Internet of Things. Agile Autonomic Cyber Security involves Intelligent Agents deployed from a Self-Organizing Self-Protecting Cyber Warfare Arsenal.

 

Cyber Security includes NSA and DoD-DARPA Open Programs. The Department of Homeland Security Computer Emergency Readiness Team (CERT) is an organization that assesses cyber security threats and vulnerabilities. The National Institute of Standards Technology (NIST) has a reference model, the Cyber Security Framework, CSF.

 

It is important for our community to understand Mandatory Access Control and Domain Type Enforcement. This is an area that focuses on NSA Orange Book and Common Criteria Evaluation Assurance Levels of "Trusted Systems". Anti-Exploits Technology as a Cyber Security Strategy is a method that prevents cyber attacks against In the Wild, Zero-Day Threats.



There is an approach to cyber security technologies that can change how we manage, secure and protect information technology resources and services. The approach is based on Agile Autonomic Computing Self-Protecting Systems.

SiBastion Technology?













要查看或添加评论,请登录

Clemente Garcia的更多文章

社区洞察

其他会员也浏览了