...
【24h】

Target Profiling

机译:目标分析

获取原文
获取原文并翻译 | 示例
           

摘要

Open source intelligence can provide a wealth of information on potential threats, both online and offline. There have been a number of technological advances in the area, notably tied to leaps in artificial intelligence (Al) and machine learning. There is a range of technologies that can be used in this domain, regulations or legislation permitting. Such developments give the defenders a new advantage, observed Camila Edry, Director of National and Aviation Cyber Programmes at Israel Aerospace Industries (IAI), boosting their chances "of getting ahead of the attacker and trying to find and prevent the attack." The analysis of online resources can allow intelligence agencies, police, armed forces and private companies to learn about planned attacks before they occur, she said, whether they be malware aimed at a company's networks or even terrorist actions. Edry said a vital area of importance is the intelligence that can be gleaned from social media networks, which can hold a trove of information "that might indicate when people are threatening your organisation." However, threats are not just external, but internal, coming from people who might even work within the organisation; for example, as part of Israel's work with the EU in the Horizon 2020 programme, IAI is working on research in cyber risk assessment, including risks of social engineering associated with cyber attacks. Finally, she highlighted the terrorist threat to critical infrastructure, such as airports, and the ability to find information on such threats through building profiles of actors online. "Airports are essentially very vulnerable places - there are researchers trying to find out from social networks information about people that might be a threat to airports."
机译:开源情报可以在线和离线提供大量有关潜在威胁的信息。该领域已经取得了许多技术进步,特别是与人工智能(Al)和机器学习的飞跃相关。在法规或法律允许的范围内,可以使用多种技术。以色列航空航天工业公司(IAI)国家和航空网络计划主任Camila Edry认为,这种事态发展为防御者带来了新的优势,从而提高了他们“领先于攻击者并试图发现并防止攻击的机会”。她说,对在线资源的分析可以使情报机构,警察,武装部队和私人公司在计划的攻击发生之前就了解它们,无论它们是针对公司网络的恶意软件,还是针对恐怖分子的行为。 Edry说,至关重要的一个领域是可以从社交媒体网络中收集的情报,该情报可以保存大量信息“可能表明人们何时威胁到您的组织。”但是,威胁不仅是外部的,而且是内部的,甚至来自在组织内工作的人;例如,作为以色列在Horizo​​n 2020计划中与欧盟合作的一部分,IAI正在研究网络风险评估,包括与网络攻击相关的社会工程风险。最后,她强调了恐怖分子对机场等关键基础设施的威胁,并强调了通过在线建立参与者形象来查找有关此类威胁的信息的能力。 “机场本质上是非常脆弱的地方-有些研究人员试图从社交网络中查找有关可能对机场构成威胁的人员的信息。”

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号