Noreen Seebacher

CORE Security Digs Through Data to Find Threats

NO RATINGS
View Comments: Newest First | Oldest First | Threaded View
Alexis
User Rank
Data Doctor
Re: That's the crux
Alexis   7/6/2012 7:05:20 PM
NO RATINGS
Yes Lyndon, you're right.

A damaging cyberattack against Iran's nuclear program was the work of U.S. and Israeli experts and proceeded under the secret orders of President Obama, who was eager to slow that nation's apparent progress toward building an atomic bomb without launching a traditional military attack, say current and former U.S. officials.

The origins of the cyberweapon, which outside analysts dubbed Stuxnet after it was inadvertently discovered in 2010, have long been debated, with most experts concluding that the United States and Israel probably collaborated on the effort. The current and former U.S. officials confirmed that long-standing suspicion in early June, after a New York Times report on the program.

Lyndon_Henry
User Rank
Blogger
Re: That's the crux
Lyndon_Henry   7/6/2012 7:00:29 PM
NO RATINGS
..

Seth writes


It reminds me of the well known F.B.I. software 'Carnivor'.  Either way, it really shows that attacks or spying can come from anyway, even a government


 

Surely the Elephant in the Room on this issue is the Stuxnet virus, designed and deployed by the U.S. government, which has gone way out of control and now in the hands of Web terrorists threatens to be unleashed as malware against the public at large.

See:

Report: Obama Ordered Stuxnet to Continue After Bug Caused It to Spread Wildly

http://www.wired.com/threatlevel/2012/06/obama-ordered-stuxnet-continued/all/

 

Noreen Seebacher
User Rank
Blogger
Re: That's the crux
Noreen Seebacher   7/6/2012 7:50:50 AM
NO RATINGS
The company believes an effecient algorithm exists that provides optimal attack plans with computational complexity O(n log n), where n is the number of actions and assets in the case of an attack tree (between two xed hosts), and O(M2 n log n) where M is the number of machines in the case of a network scenario.

Anish
User Rank
Blogger
Re: That's the crux
Anish   7/6/2012 12:46:27 AM
NO RATINGS
Thanks for sharing this Noreen. Did Shah mention about the kind of large data available there which can help them boost the performance of their alogorithms if they wanted to ?

SethBreedlove
User Rank
Data Doctor
Re: That's the crux
SethBreedlove   7/5/2012 10:32:46 PM
NO RATINGS
It reminds me of the well known F.B.I. software 'Carnivor'.  Either way, it really shows that attacks or spying can come from anyway, even a government.  It could come from corporate espinioge. Some competitors are more ethical than others. 

Noreen Seebacher
User Rank
Blogger
Re: That's the crux
Noreen Seebacher   7/5/2012 11:39:25 AM
NO RATINGS
Interesting stuff on the flame virus, including the fact that there is speculation is was built by a government entity.

Moscow - While the identity of the Flame virus authors remains elusive, a security company is convinced that the evidence points to a sophisticated government operation.

"Who built Flame? It's some government; I don't know which exactly because we don't have any real hard proof, but it's not the usual cybercriminals," Alex Gostev, chief security expert at Kaspersky Lab told News24.

He said that though Flame made headlines, it was not the first super virus and it is likely that the developers are already working on a more advanced version.

SethBreedlove
User Rank
Data Doctor
Re: That's the crux
SethBreedlove   7/3/2012 9:22:01 PM
NO RATINGS
It good to be pro-active.  I'm wondering how security is responding to new types of threats such as the flame virus, a virus that can learn about the system it's attacking and adapt in order to hide. 

Noreen Seebacher
User Rank
Blogger
Re: That's the crux
Noreen Seebacher   7/3/2012 1:38:37 PM
NO RATINGS
Yes, absolutely. But I'm a bit surprised upper management isn't at least curious about the solutions. I'm no tech expert but I enjoy having an understanding of the gobbledygook!

BethSchultz
User Rank
Blogger
That's the crux
BethSchultz   7/3/2012 1:19:21 PM
NO RATINGS
Hi Noreen. I find myself wanting to substitute in just about any business term for Shah's use of the words "network security," in his closing quote: "They generally don't care about the technical gobbledegook behind network security. They aren't interested in more data. They just want solutions to their problems." Because, really, isn't that what analytics is supposed to be all about, regardless of discipline?

Information Resources
More Blogs from Noreen Seebacher
Everyone is talking about big-data as an HR solution, so why doesn't it seem like we're any closer to solving the people problem?
Even at a trade fair better known for seminars on information technology, big-data was too significant to ignore.
All Analytics readers have serious issues with the data hidden in digital photos.
The system we use to select American courtroom juries is riddled with delays, frustrations, and inefficiencies.
It was actually a little too easy to slip a cellphone past security at a federal courthouse.
Radio Show
Radio Shows
UPCOMING
James M. Connolly
Hire and Manage a Great Analytics Team


9/1/2015   REGISTER   2
ARCHIVE
James M. Connolly
Use Mobile Analytics to See the Big Picture


8/26/2015  LISTEN   83
ARCHIVE
James M. Connolly
Survive the Digital Transformation


8/18/2015  LISTEN   85
ARCHIVE
James M. Connolly
Health Analytics: Find Data Beyond the Hospital Doors


7/28/2015  LISTEN   47
ARCHIVE
James M. Connolly
Finding Answers Through Prescriptive Analytics


7/21/2015  LISTEN   117
ARCHIVE
James M. Connolly
Visualization: How to Bring Data to Life


6/22/2015  LISTEN   55
ARCHIVE
James M. Connolly
Learn Why Analytics Are at Home in the Cloud


6/15/2015  LISTEN   26
ARCHIVE
James M. Connolly
Analytics: Your Defense Against Cyber Threats


5/27/2015  LISTEN   60
ARCHIVE
James M. Connolly
Big Data & Big Pharma: How Analytics Might Save Your Life


5/19/2015  LISTEN   37
ARCHIVE
James M. Connolly
Live Interviews From SAS Global Forum


4/28/2015  LISTEN   11
ARCHIVE
James M. Connolly
How to Hire Great Analytics Talent


4/23/2015  LISTEN   51
Information Resources
Follow us on Twitter
Follow us on Twitter
Quick Poll
Quick Poll
Like us on Facebook
Like us on Facebook
About Us  |  Contact Us  |  Help  |  Register  |  Twitter  |  Facebook  |  RSS