DocumentCode :
1690653
Title :
A practical solution to improve cyber security on a global scale
Author :
Patel, Vaibhav
Author_Institution :
secur IT ism Ltd., London, UK
fYear :
2012
Firstpage :
1
Lastpage :
5
Abstract :
This paper introduces a technical, social and ethical organization freely sharing cyber attack vectors in the spirit of global co-operation crossing geo-political borders by deploying active monitoring. More importantly it introduces a radically new and better suited workforce to identify past, present and future cyber threats by better “big data” analytics. Current tools and techniques lag behind the cyber attacks and cannot be automated as the attackers are humans and can circumvent controls. The problem is that security tasks are difficult and complex. We lose focus and don´t see the patterns that we should and few, if any, current staff like this manual work. securITism delivers a globally unique solution to this problem by using local high-functioning autistic (Asperger´s Syndrome) graduates to actively monitor networks and flows. They are selected for the fact that they have strong 3D visualization; pattern recognition; long term memory; sense of logic; and thinking outside the box. The vision for this solution came from research, design, development and deployment of electronics, operating systems and resilient network security technologies spanning almost three decades. Armed with the knowledge down to component/kernel levels and having to think like a hacker, it is completely feasible that a single person can potentially cause catastrophic failure to virtually any critical infrastructure.
Keywords :
Big Data; computer network security; data analysis; ethical aspects; operating system kernels; social aspects of automation; 3D visualization; Asperger Syndrome; active monitoring; big data analytics; catastrophic failure; critical infrastructure; cyber attack vector sharing; cyber attacks; cyber security; cyber threats; ethical organization; geo-political borders; global co-operation; local high-functioning autistic graduates; logic sense; long term memory; network monitoring; operating system security technologies; pattern recognition; resilient network security technologies; securITism; security tasks; social organization; technical organization; technical socio-ethical approach; Autism; Computer crime; Kernel; Manuals; Weapons; ASD; Asperger´s Sydrome; Aurora; Autism; Autistic Spectrum Disorder; CER; Duq; Flame; Gauss; IP V6; MSSP; Passwerk; SIEM; Securitism; Stuxnet; active monitoring; attack vectors; big data; big data analytics; cross-correlatio; cyber defense; cyber intelligence sharing; encryption; man-in-the-middle; network flows; network management systems; neuro-typical; securITism; strengths in autism; weaponization; worm;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cybersecurity Summit (WCS), 2012 Third Worldwide
Conference_Location :
New Delhi
Type :
conf
DOI :
10.1109/WCS.2012.6780876
Filename :
6780876
Link To Document :
بازگشت