25,73 €
28,59 €
-10% with code: EXTRA
Enabling Distributed Security in Cyberspace
Enabling Distributed Security in Cyberspace
25,73
28,59 €
  • We will send in 10–14 business days.
This study was prepared under the direction of Philip Reitinger, Deputy Under Secretary for the National Protection and Programs Directorate (NPPD), U.S. Department of Homeland Security, with support from the NPPD Cyber Strategy Staff, the federally funded Homeland Security Systems Engineering and Development Institute (HS SEDI), and the NPPD Office of Cybersecurity and Communications (CS&C). In 2010, NPPD sponsored a government workshop to discuss a draft of this paper. Recommendations from th…
  • SAVE -10% with code: EXTRA

Enabling Distributed Security in Cyberspace (e-book) (used book) | bookbook.eu

Reviews

Description

This study was prepared under the direction of Philip Reitinger, Deputy Under Secretary for the National Protection and Programs Directorate (NPPD), U.S. Department of Homeland Security, with support from the NPPD Cyber Strategy Staff, the federally funded Homeland Security Systems Engineering and Development Institute (HS SEDI), and the NPPD Office of Cybersecurity and Communications (CS&C). In 2010, NPPD sponsored a government workshop to discuss a draft of this paper. Recommendations from that workshop have been incorporated.This study explores a future - a "healthy cyber ecosystem" - where cyber devices collaborate in near-real time in their own defense. In this future, cyber devices have innate capabilities that enable them to work together to anticipate and prevent cyber attacks, limit the spread of attacks across participating devices, minimize the consequences of attacks, and recover to a trusted state.This study presents three building blocks as foundational for a healthy cyber ecosystem: automation, interoperability, and authentication. The paper then considers how these building blocks contribute to ecosystem maturity and explores incentives for creating such a system. It concludes with thoughts on the way ahead.The envisioned end-state is focused specifically on capabilities that can be achieved in the near- and mid-term by utilizing standards-based software and information to strengthen self-defense through automated collective action. This paper is meant to provoke discussion and further exploration of the topic.

EXTRA 10 % discount with code: EXTRA

25,73
28,59 €
We will send in 10–14 business days.

The promotion ends in 19d.23:00:36

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 0,29 Book Euros!?

This study was prepared under the direction of Philip Reitinger, Deputy Under Secretary for the National Protection and Programs Directorate (NPPD), U.S. Department of Homeland Security, with support from the NPPD Cyber Strategy Staff, the federally funded Homeland Security Systems Engineering and Development Institute (HS SEDI), and the NPPD Office of Cybersecurity and Communications (CS&C). In 2010, NPPD sponsored a government workshop to discuss a draft of this paper. Recommendations from that workshop have been incorporated.This study explores a future - a "healthy cyber ecosystem" - where cyber devices collaborate in near-real time in their own defense. In this future, cyber devices have innate capabilities that enable them to work together to anticipate and prevent cyber attacks, limit the spread of attacks across participating devices, minimize the consequences of attacks, and recover to a trusted state.This study presents three building blocks as foundational for a healthy cyber ecosystem: automation, interoperability, and authentication. The paper then considers how these building blocks contribute to ecosystem maturity and explores incentives for creating such a system. It concludes with thoughts on the way ahead.The envisioned end-state is focused specifically on capabilities that can be achieved in the near- and mid-term by utilizing standards-based software and information to strengthen self-defense through automated collective action. This paper is meant to provoke discussion and further exploration of the topic.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)