Popular articles

Vladimir Orlov: “Russia and the United States should resume a comprehensive dialogue on global nuclear proliferation threats” image

On January 19, 2021, Dr. Vladimir A. Orlov, Director of the PIR Center, gave an interview to Security Index journal.

 

SECURITY INDEX: In your recent op-ed column, co-authored with Sergey Semenov and published by Kommersant Daily, you stated that “Russia and the United States, as major nuclear-weapo...

Now when the U.S. presidential elections are over the fate of the START Treaty and nuclear arms control, in general, has become clearer.

The New START treaty is set to expire on February 5, 2021, and only a few months ago there was little doubt that it would be the end of it. The Trump administratio...

Nuclear energy in Saudi Arabia within Vision 2030 Program: Prospects for nuclear energy cooperation and nonproliferation risks image

Saudi Arabia is considered a nuclear “newcomer”. Although Saudi Arabia’s nuclear program dates back to the 1960s, the kingdom has demonstrated significant interest in nuclear energy only over the last decade. The Saudi interest in the peaceful use of nuclear energy is due to several reasons, among w...

All articles

Poll



 

How Do You Create a World Financial Community That Is Resilient in the Face of Cyber-Security, Cyber-Espionage, and Hacking?

William Abbott Foster, Hannah Thoreson

Today effective cyber defenses assume higher levels of trust for automated threat sharing, but increased threat sharing also increases one`s vulnerability to new kinds of targeted threats from those with who have learned about your weaknesses. We have moved from a simple world where a threat could be detected by a signature downloaded from an anti-virus firm like Macafee or Symantec and neutralized.

Now attackers will now probe thousands of network simultaneously with thousands of different attacks a second looking for an exploitable vulnerabilities.  These attacks are far  beyond the capability of human operator to identify, isolate, and respond to such attacks or to let those they trust in government and industry to know about the attack in a timely (sub-second) window.

The first step in building an automated defense to current threats, is to make the threat information software and hardware independent. The U.S. government think tank MITRE under contact to the US Department of Homeland Security has developed an XML based system for automatic structured threat information called STIX.


Imprint:

Online Section of PIR Center Program "International Information Security and Global Internet Governance"

Comments

 
 
loading