Noreen Seebacher

CORE Security Digs Through Data to Find Threats

NO RATINGS
View Comments: Newest First | Oldest First | Threaded View
Alexis
User Rank
Data Doctor
Re: That's the crux
Alexis   7/6/2012 7:05:20 PM
NO RATINGS
Yes Lyndon, you're right.

A damaging cyberattack against Iran's nuclear program was the work of U.S. and Israeli experts and proceeded under the secret orders of President Obama, who was eager to slow that nation's apparent progress toward building an atomic bomb without launching a traditional military attack, say current and former U.S. officials.

The origins of the cyberweapon, which outside analysts dubbed Stuxnet after it was inadvertently discovered in 2010, have long been debated, with most experts concluding that the United States and Israel probably collaborated on the effort. The current and former U.S. officials confirmed that long-standing suspicion in early June, after a New York Times report on the program.

Lyndon_Henry
User Rank
Blogger
Re: That's the crux
Lyndon_Henry   7/6/2012 7:00:29 PM
NO RATINGS
..

Seth writes


It reminds me of the well known F.B.I. software 'Carnivor'.  Either way, it really shows that attacks or spying can come from anyway, even a government


 

Surely the Elephant in the Room on this issue is the Stuxnet virus, designed and deployed by the U.S. government, which has gone way out of control and now in the hands of Web terrorists threatens to be unleashed as malware against the public at large.

See:

Report: Obama Ordered Stuxnet to Continue After Bug Caused It to Spread Wildly

http://www.wired.com/threatlevel/2012/06/obama-ordered-stuxnet-continued/all/

 

Noreen Seebacher
User Rank
Blogger
Re: That's the crux
Noreen Seebacher   7/6/2012 7:50:50 AM
NO RATINGS
The company believes an effecient algorithm exists that provides optimal attack plans with computational complexity O(n log n), where n is the number of actions and assets in the case of an attack tree (between two xed hosts), and O(M2 n log n) where M is the number of machines in the case of a network scenario.

Anish
User Rank
Blogger
Re: That's the crux
Anish   7/6/2012 12:46:27 AM
NO RATINGS
Thanks for sharing this Noreen. Did Shah mention about the kind of large data available there which can help them boost the performance of their alogorithms if they wanted to ?

SethBreedlove
User Rank
Data Doctor
Re: That's the crux
SethBreedlove   7/5/2012 10:32:46 PM
NO RATINGS
It reminds me of the well known F.B.I. software 'Carnivor'.  Either way, it really shows that attacks or spying can come from anyway, even a government.  It could come from corporate espinioge. Some competitors are more ethical than others. 

Noreen Seebacher
User Rank
Blogger
Re: That's the crux
Noreen Seebacher   7/5/2012 11:39:25 AM
NO RATINGS
Interesting stuff on the flame virus, including the fact that there is speculation is was built by a government entity.

Moscow - While the identity of the Flame virus authors remains elusive, a security company is convinced that the evidence points to a sophisticated government operation.

"Who built Flame? It's some government; I don't know which exactly because we don't have any real hard proof, but it's not the usual cybercriminals," Alex Gostev, chief security expert at Kaspersky Lab told News24.

He said that though Flame made headlines, it was not the first super virus and it is likely that the developers are already working on a more advanced version.

SethBreedlove
User Rank
Data Doctor
Re: That's the crux
SethBreedlove   7/3/2012 9:22:01 PM
NO RATINGS
It good to be pro-active.  I'm wondering how security is responding to new types of threats such as the flame virus, a virus that can learn about the system it's attacking and adapt in order to hide. 

Noreen Seebacher
User Rank
Blogger
Re: That's the crux
Noreen Seebacher   7/3/2012 1:38:37 PM
NO RATINGS
Yes, absolutely. But I'm a bit surprised upper management isn't at least curious about the solutions. I'm no tech expert but I enjoy having an understanding of the gobbledygook!

BethSchultz
User Rank
Blogger
That's the crux
BethSchultz   7/3/2012 1:19:21 PM
NO RATINGS
Hi Noreen. I find myself wanting to substitute in just about any business term for Shah's use of the words "network security," in his closing quote: "They generally don't care about the technical gobbledegook behind network security. They aren't interested in more data. They just want solutions to their problems." Because, really, isn't that what analytics is supposed to be all about, regardless of discipline?

Information Resources
More Blogs from Noreen Seebacher
Everyone is talking about big-data as an HR solution, so why doesn't it seem like we're any closer to solving the people problem?
Even at a trade fair better known for seminars on information technology, big-data was too significant to ignore.
All Analytics readers have serious issues with the data hidden in digital photos.
The system we use to select American courtroom juries is riddled with delays, frustrations, and inefficiencies.
It was actually a little too easy to slip a cellphone past security at a federal courthouse.
Radio Show
Radio Shows
ARCHIVE
James M. Connolly
Predictive Analytics Create a New World of Marketing


3/31/2015  LISTEN   90
ARCHIVE
James M. Connolly
Sports Analytics Mean Fun and Business


3/24/2015  LISTEN   4
ARCHIVE
James M. Connolly
Secure Your Big Data in the Cloud


2/26/2015  LISTEN   114
ARCHIVE
James M. Connolly
Make It Big As a Data Scientist in 2015


2/11/2015  LISTEN   106
ARCHIVE
James M. Connolly
Big Data, Decisions & the Simulated Experience


2/3/2015  LISTEN   87
ARCHIVE
James M. Connolly
A Chat About Big Data, Machine Learning & Value


1/15/2015  LISTEN   125
ARCHIVE
Curtis Franklin Jr.
An Infrastructure for Analytics


12/18/2014  LISTEN   63
ARCHIVE
James M. Connolly
Prepare for the Internet of Things Data Blitz


12/16/2014  LISTEN   50
ARCHIVE
James M. Connolly
How Mature Is Your Analytics Program?


11/18/2014  LISTEN   148
ARCHIVE
James M. Connolly
Drive Big Decisions Using Data & Analytics


11/10/2014  LISTEN   73
Information Resources
Infographic
Infographic
It Pays to Keep Insurance Fraud in Check
While 97% of insurers say that insurance fraud has increased or remained the same in the past two years, most of those companies report benefits from anti-fraud technology in limiting the impact of fraud, including higher quality referrals, the ability to uncover organized fraud, and improve efficiency for investigators.
Follow us on Twitter
Follow us on Twitter
Like us on Facebook
Like us on Facebook
Quick Poll
Quick Poll
About Us  |  Contact Us  |  Help  |  Register  |  Twitter  |  Facebook  |  RSS