Prime logotipo Exclusivo para miembros Prime: ¿Nuevo en Audible? Obtén 2 audiolibros gratis con tu prueba.
Elige 1 audiolibro al mes de nuestra inigualable colección.
Escucha todo lo que quieras de entre miles de audiolibros, Originals y podcasts incluidos.
Accede a ofertas y descuentos exclusivos.
Premium Plus se renueva automáticamente por $14.95 al mes después de 30 días. Cancela en cualquier momento.
NIST Cybersecurity & Privacy  Por  arte de portada

NIST Cybersecurity & Privacy

De: NIST - FBI - CISA - US Department of Justice
Narrado por: Tom Brooks
Prueba por $0.00

US$14.95 al mes después de 30 días. Cancela en cualquier momento.

Compra ahora por US$14.95

Compra ahora por US$14.95

la tarjeta con terminación
Al confirmar tu compra, aceptas las Condiciones de Uso de Audible y el Aviso de Privacidad de Amazon. Impuestos a cobrar según aplique.

Resumen del Editor

The National Institute of Standards and Technology (NIST) develops cybersecurity standards, guidelines, best practices, and other resources to meet the needs of US industry, federal agencies, and the broader public. Our work ranges from specific information that can be put into practice immediately to longer-term research that anticipates advances in technologies and future challenges.

As part of our efforts to cultivate trust in information, systems, and technologies and to help organizations measure and manage risk, we carry out cybersecurity assignments defined by federal statutes, executive orders, and policies, including developing cybersecurity standards and guidelines for federal agencies.

Indicators of suspicious activity that threat hunters should look for include:

  • Unusual inbound and outbound network traffic,
  • Compromise of administrator privileges or escalation of the permissions on an account,
  • Theft of login and password credentials,
  • Substantial increase in database read volume,
  • Geographical irregularities in access and log in patterns,
  • Attempted user activity during anomalous logon times,
  • Attempts to access folders on a server that are not linked to the HTML within the pages of the
    web server, and
  • Baseline deviations in the type of outbound encrypted traffic since advanced persistent threat
    actors frequently encrypt exfiltration.

The United States’ reliance on networked systems and the high costs associated with cyber attacks have led many leaders in the US government and the Department of Defense (DOD) to prioritize protecting our critical networked infrastructure. Part of that focus is trying to develop a strategy for deterring adversaries from attacking our networks in the first place. This effort has led to much debate around the question of whether cyber deterrence is possible.

Answering this question is difficult since the number of adversary groups capable of attacking US networks is large and our ability to deter each group will vary based on its motives and levels of risk tolerance. The United States should not expect a cyber deterrence strategy to achieve the kind of results seen with our nuclear deterrence strategy during the Cold War. However, a limited US cyber deterrence strategy is possible. To be effective, this strategy must be multilayered and use all instruments of US national power. The strategy employed against one adversary group (e.g., criminal actors) will be different than that against another group (e.g., state or state-sponsored actors).

This paper explores (1) the difficulties of deterring unwanted cyber activities by each group of cyber threats, (2) realistic expectations for a deterrence strategy, and (3) proposals to help mitigate the problems.

©2021 Tom Brooks (P)2021 Tom Brooks

Lo que los oyentes dicen sobre NIST Cybersecurity & Privacy

Calificaciones medias de los clientes
Total
  • 1 out of 5 stars
  • 5 estrellas
    0
  • 4 estrellas
    0
  • 3 estrellas
    0
  • 2 estrellas
    0
  • 1 estrella
    1
Ejecución
  • 1 out of 5 stars
  • 5 estrellas
    0
  • 4 estrellas
    0
  • 3 estrellas
    0
  • 2 estrellas
    0
  • 1 estrella
    1
Historia
  • 1 out of 5 stars
  • 5 estrellas
    0
  • 4 estrellas
    0
  • 3 estrellas
    0
  • 2 estrellas
    0
  • 1 estrella
    1

Reseñas - Selecciona las pestañas a continuación para cambiar el origen de las reseñas.

Ordenar por:
Filtrar por:
  • Total
    1 out of 5 stars
  • Ejecución
    1 out of 5 stars
  • Historia
    1 out of 5 stars

worthless in audio format

the material is not useful as audio. it's a government publication more like a reference book. the narrator mispronounces even the easiest words (like cryptography). maybe audio was computer generated? all around disappointing.

Se ha producido un error. Vuelve a intentarlo dentro de unos minutos.

Has calificado esta reseña.

Reportaste esta reseña