Virtualization Of Information Object Vulnerability Testing Container Based On Dex Technology And Deep Learning Neural Networks


Download Virtualization Of Information Object Vulnerability Testing Container Based On Dex Technology And Deep Learning Neural Networks PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Virtualization Of Information Object Vulnerability Testing Container Based On Dex Technology And Deep Learning Neural Networks book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Virtualization of information object vulnerability testing container based on DeX technology and deep learning neural networks


Virtualization of information object vulnerability testing container based on DeX technology and deep learning neural networks

Author: Борис Окунев

language: en

Publisher: Litres

Release Date: 2021-10-01


DOWNLOAD





Современное развитие средств обеспечения информационной безопасности, наряду с усовершенствованием методик удаленного доступа, позволяет производить аудит программно-аппаратных компонентов без необходимости прямого доступа к тестируемой системе. В рамках данного направления развития выделяется подход, позволяющий интегрировать дистрибутивы на базе ядра Linux представлением виртуального контейнера chroot в системе на базе Android OS и, как следствие, осуществлять тестирование на проникновение без необходимости использования персональных компьютеров. Примером реализации данного подхода является дистрибутив Kali NetHunter, позволяющий за счет модуля KeX реализовать функционал удаленного администрирования системой. Кроме очевидных преимуществ KeX функционала также следует выделить ряд недостатков – низкая скорость обработки графической оболочки за счет трансляции на удаленных хост и необходимость поддержки трансляции на уровне операционной системы. Вторая проблема – затраты энергоресурсов при использовании возможностей рабочего стола в KeX модуле. Для решения указанных проблем была разработана система виртуализации энергоэффективного контейнера тестирования уязвимостей критически важных информационных объектов, основной принцип действия которой – мультиконтейнеризация. Программная составляющая представлена двумя элементами: модулем интеграции контейнера chroot в среду DeX и модулем обеспечения энергоэффективности за счет использования предиктивных моделей нейронных сетей. В результате сравнения эффективности существующих и реализованного подхода при тестировании на проникновение отмечено, что предлагаемая система может быть использована при тестировании безопасности различных информационных объектов.

Guide to Vulnerability Analysis for Computer Networks and Systems


Guide to Vulnerability Analysis for Computer Networks and Systems

Author: Simon Parkinson

language: en

Publisher: Springer

Release Date: 2018-09-04


DOWNLOAD





This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerability assessment are covered in detail, including recent advancements in reducing the requirement for expert knowledge through novel applications of artificial intelligence. The work also offers a series of case studies on how to develop and perform vulnerability assessment techniques using start-of-the-art intelligent mechanisms. Topics and features: provides tutorial activities and thought-provoking questions in each chapter, together with numerous case studies; introduces the fundamentals of vulnerability assessment, and reviews the state of the art of research in this area; discusses vulnerability assessment frameworks, including frameworks for industrial control and cloud systems; examines a range of applications that make use of artificial intelligence to enhance the vulnerability assessment processes; presents visualisation techniques that can be used to assist the vulnerability assessment process. In addition to serving the needs of security practitioners and researchers, this accessible volume is also ideal for students and instructors seeking a primer on artificial intelligence for vulnerability assessment, or a supplementary text for courses on computer security, networking, and artificial intelligence.

Vulnerability Description Ontology (Vdo)


Vulnerability Description Ontology (Vdo)

Author: National Institute National Institute of Standards and Technology

language: en

Publisher: Createspace Independent Publishing Platform

Release Date: 2016-09-30


DOWNLOAD





NISTIR 8138 (Draft) September 2016 If you like this book, please leave positive review. This document aims to describe a more effective and efficient methodology for characterizing vulnerabilities found in various forms of software and hardware implementations including but not limited to information technology systems, industrial control systems or medical devices to assist in the vulnerability management process. The primary goal of the described methodology is to enable automated analysis using metrics such as the Common Vulnerability Scoring System (CVSS). Why buy a book you can download for free? First you gotta find it and make sure it's the latest version, not always easy. Then you gotta print it using a network printer you share with 100 other people - and its outta paper - and the toner is low (take out the toner cartridge, shake it, then put it back). If it's just 10 pages, no problem, but if it's a 250-page book, you will need to punch 3 holes in all those pages and put it in a 3-ring binder. Takes at least an hour. An engineer that's paid $75 an hour has to do this himself (who has assistant's anymore?). If you are paid more than $10 an hour and use an ink jet printer, buying this book will save you money. It's much more cost-effective to just order the latest version from Amazon.com This public domain material is published by 4th Watch Books. We publish tightly-bound, full-size books at 8 1⁄2 by 11 inches, with glossy covers. 4th Watch Books is a Service Disabled Veteran Owned Small Business (SDVOSB) and is not affiliated with the National Institute of Standards and Technology. For more titles published by 4th Watch, please visit: cybah.webplus.net A full copy of all the pertinent cybersecurity standards is available on DVD-ROM in the CyberSecurity Standards Library disc which is available at Amazon.com. GSA P-100 Facilities Standards for the Public Buildings Service GSA P-120 Cost and Schedule Management Policy Requirements GSA P-140 Child Care Center Design Guide GSA Standard Level Features and Finishes for U.S. Courts Facilities GSA Courtroom Technology Manual NIST SP 500-299 NIST Cloud Computing Security Reference Architecture NIST SP 500-291 NIST Cloud Computing Standards Roadmap Version 2 NIST SP 500-293 US Government Cloud Computing Technology Roadmap Volume 1 & 2 NIST SP 500-293 US Government Cloud Computing Technology Roadmap Volume 3 DRAFT NIST SP 1800-8 Securing Wireless Infusion Pumps NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) NIST SP 800-66 Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule NIST SP 1800-1 Securing Electronic Health Records on Mobile Devices NIST SP 800-177 Trustworthy Email NIST SP 800-184 Guide for Cybersecurity Event Recovery NIST SP 800-190 Application Container Security Guide NIST SP 800-193 Platform Firmware Resiliency Guidelines NIST SP 1800-1 Securing Electronic Health Records on Mobile Devices NIST SP 1800-2 Identity and Access Management for Electric Utilities NIST SP 1800-5 IT Asset Management: Financial Services NIST SP 1800-6 Domain Name Systems-Based Electronic Mail Security NIST SP 1800-7 Situational Awareness for Electric Utilities DoD Medical Space Planning Criteria FARs Federal Acquisitions Regulation DFARS Defense Federal Acquisitions Regulations Supplement