As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo...As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.展开更多
As a large amount of data needs to be processed and speed needs to be improved,edge computing with ultra-low latency and ultra-connectivity is emerging as a new paradigm.These changes can lead to new cyber risks,and s...As a large amount of data needs to be processed and speed needs to be improved,edge computing with ultra-low latency and ultra-connectivity is emerging as a new paradigm.These changes can lead to new cyber risks,and should therefore be considered for a security threat model.To this end,we constructed an edge system to study security in two directions,hardware and software.First,on the hardware side,we want to autonomically defend against hardware attacks such as side channel attacks by configuring field programmable gate array(FPGA)which is suitable for edge computing and identifying communication status to control the communication method according to priority.In addition,on the software side,data collected on the server performs end-to-end encryption via symmetric encryption keys.Also,we modeled autonomous defense systems on the server by using machine learning which targets to incoming and outgoing logs.Server log utilizes existing intrusion detection datasets that should be used in real-world environments.Server log was used to detect intrusion early by modeling an intrusion prevention system to identify behaviors that violate security policy,and to utilize the existing intrusion detection data set that should be used in a real environment.Through this,we designed an efficient autonomous defense system that can provide a stable system by detecting abnormal signals from the device and converting them to an effective method to control edge computing,and to detect and control abnormal intrusions on the server side.展开更多
This paper analyzes the characteristics of Interact space and confrontation, discussed on the main technology of network space attack and defense confrontation. The paper presents the realization scheme of network spa...This paper analyzes the characteristics of Interact space and confrontation, discussed on the main technology of network space attack and defense confrontation. The paper presents the realization scheme of network space attack defense confrontation system, and analyzes its feasibility. The technology and the system can provide technical support for the system in the network space of our country development, and safeguard security of network space in China, promote the development of the network space security industry of China, it plays an important role and significance to speed up China' s independent controllable security products development.展开更多
During the rainy season in Brazil,landslides can have catastrophic consequences,including loss of life,damage to urban infrastructure and significant economic impacts.Now,more than eight million people in Brazil live ...During the rainy season in Brazil,landslides can have catastrophic consequences,including loss of life,damage to urban infrastructure and significant economic impacts.Now,more than eight million people in Brazil live in disaster-prone areas.The objective of this article is to present a chronological review of the principal policies and programmes at the national,state,and municipal levels,with an emphasis on their key actions aimed at mitigating the impact of disasters related to natural hazards,particularly landslides.Our analysis was based on official records of public policies from the national,state,and municipal governments.The results show that several initiatives were initially developed at the local and regional level.However,it was not until the late 1980s that a comprehensive organisation of civil protection at the national level emerged as a response measure.It is possible to highlight three phases(understanding,coexistence,and prevention)of institutional action focused on risk management in the face of disasters.Despite the growing knowledge of risk scenarios,disasters continue to occur in Brazil on an annual basis,revealing several obstacles to reducing their impact,particularly given the social and economic disparities between Brazilian regions and the applicability of public policies that must overcome the limitations of each municipality.展开更多
文摘As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.
基金This research was funded by Korea Environmental Industry&Technology Institute(KEITI),Grant Number RE202101551and The APC was funded by Ministry of Environment(ME).
文摘As a large amount of data needs to be processed and speed needs to be improved,edge computing with ultra-low latency and ultra-connectivity is emerging as a new paradigm.These changes can lead to new cyber risks,and should therefore be considered for a security threat model.To this end,we constructed an edge system to study security in two directions,hardware and software.First,on the hardware side,we want to autonomically defend against hardware attacks such as side channel attacks by configuring field programmable gate array(FPGA)which is suitable for edge computing and identifying communication status to control the communication method according to priority.In addition,on the software side,data collected on the server performs end-to-end encryption via symmetric encryption keys.Also,we modeled autonomous defense systems on the server by using machine learning which targets to incoming and outgoing logs.Server log utilizes existing intrusion detection datasets that should be used in real-world environments.Server log was used to detect intrusion early by modeling an intrusion prevention system to identify behaviors that violate security policy,and to utilize the existing intrusion detection data set that should be used in a real environment.Through this,we designed an efficient autonomous defense system that can provide a stable system by detecting abnormal signals from the device and converting them to an effective method to control edge computing,and to detect and control abnormal intrusions on the server side.
文摘This paper analyzes the characteristics of Interact space and confrontation, discussed on the main technology of network space attack and defense confrontation. The paper presents the realization scheme of network space attack defense confrontation system, and analyzes its feasibility. The technology and the system can provide technical support for the system in the network space of our country development, and safeguard security of network space in China, promote the development of the network space security industry of China, it plays an important role and significance to speed up China' s independent controllable security products development.
基金supported by the National Council for Scientific and Technological Development(Grant No.310709/2020-2 and 409314/2023-4)the São Paulo Research Foundation(Grant No.2022/13591-6 and 2021/04621-6).
文摘During the rainy season in Brazil,landslides can have catastrophic consequences,including loss of life,damage to urban infrastructure and significant economic impacts.Now,more than eight million people in Brazil live in disaster-prone areas.The objective of this article is to present a chronological review of the principal policies and programmes at the national,state,and municipal levels,with an emphasis on their key actions aimed at mitigating the impact of disasters related to natural hazards,particularly landslides.Our analysis was based on official records of public policies from the national,state,and municipal governments.The results show that several initiatives were initially developed at the local and regional level.However,it was not until the late 1980s that a comprehensive organisation of civil protection at the national level emerged as a response measure.It is possible to highlight three phases(understanding,coexistence,and prevention)of institutional action focused on risk management in the face of disasters.Despite the growing knowledge of risk scenarios,disasters continue to occur in Brazil on an annual basis,revealing several obstacles to reducing their impact,particularly given the social and economic disparities between Brazilian regions and the applicability of public policies that must overcome the limitations of each municipality.