Towards a C2I Platform for Combating the Cyber-Threat

Abstract : In my talk, I outline a number of cyber-attacks that have been reported in recent years, and examine the vulnerability of organisations and critical infrastructure to them. I then discuss an approach to combating cyber-threats that integrates specialised tools within a managed service platform to create a command, control an intelligence (C2I) system used to co-ordinated defences against a diverse collection of resourceful and persistent opponents. The discussion is illustrated with examples from BT research and development projects. Such a system will have to be refreshed and up-graded regularly to keep pace with challenges such as: The escalating arms race against threat agents, Innovations in technology and business practice, Changing regulations and compliance demands, A cyber-Moore’s Law that dictates a continual shrinking of required response times Ultimately it will need to be adaptive and to learn from experience.
Type de document :
Communication dans un congrès
Ioannis Askoxylakis; Henrich C. Pöhls; Joachim Posegga. 6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. Springer, Lecture Notes in Computer Science, LNCS-7322, pp.17-19, 2012, Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems. 〈10.1007/978-3-642-30955-7_2〉
Liste complète des métadonnées

https://hal.inria.fr/hal-01534309
Contributeur : Hal Ifip <>
Soumis le : mercredi 7 juin 2017 - 15:03:42
Dernière modification le : mercredi 7 juin 2017 - 15:05:25
Document(s) archivé(s) le : vendredi 8 septembre 2017 - 12:53:38

Fichier

978-3-642-30955-7_2_Chapter.pd...
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Paul Kearney. Towards a C2I Platform for Combating the Cyber-Threat. Ioannis Askoxylakis; Henrich C. Pöhls; Joachim Posegga. 6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. Springer, Lecture Notes in Computer Science, LNCS-7322, pp.17-19, 2012, Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems. 〈10.1007/978-3-642-30955-7_2〉. 〈hal-01534309〉

Partager

Métriques

Consultations de la notice

58

Téléchargements de fichiers

22