COMPUTER NETWORK DEFENSE

Type: Keyphrase
Name: COMPUTER NETWORK DEFENSE
First reported Oct 16 2014 - Updated Oct 16 2014 - 1 reports

NCDOC officer receives Vice Adm. Richard W. Mayo award

Suffolk -- Lt. Cmdr. Scott F. Cole of Navy Cyber Defense Operations Command (NCDOC), Suffolk, was the recent recipient of the 2013 Vice Adm. Richard W. Mayo Award.The prestigious Mayo Award, named for the first commander of Naval Network Warfare Command, ... [Published Norfolk Navy Flagship - Oct 16 2014]
First reported Oct 15 2014 - Updated Oct 15 2014 - 1 reports

Global CyberLympics champions announced at ISACA conference in Barcelona

Cybersecurity professionals from across the globe came together to compete in the World Finals of the Global CyberLympics held on September 29 2014 at ISACA ’s EuroCACS/Information Security and Risk Management Conference in Barcelona, Spain.Cybersecurity ... [Published Government Security News - Oct 15 2014]
First reported Oct 14 2014 - Updated Oct 14 2014 - 1 reports

NSA Agents Physically Infiltrated Communication Companies from China, Germany and South Korea

The latest Snowden leaked documents revealed that the NSA has physically infiltrated and compromised devices and networks from communication companies within China, Germany and South Korea during their “physical subversion” programs. The Intercept ... [Published HOTforSecurity - Oct 14 2014]
First reported Oct 13 2014 - Updated Oct 13 2014 - 1 reports

NSA’s “Core Secrets” suggests agents inside firms in US, abroad

The U.S. National Security Agency has worked with companies to weaken encryption products at the same time it infiltrated firms to gain access to sensitive systems, according to a purportedly leaked classified document outlined in an article on The Intercept ... [Published ArsTechnica - Oct 13 2014]
First reported Oct 12 2014 - Updated Oct 13 2014 - 1 reports

Core Secrets: NSA Saboteurs in China and Germany

The National Security Agency has had agents in China, Germany, and South Korea working on programs that use “physical subversion” to infiltrate and compromise networks and devices, according to documents obtained by  The Intercept .The documents, leaked ... [Published ZNet - Oct 12 2014]
First reported Oct 11 2014 - Updated Oct 12 2014 - 1 reports

NSA Agents Infiltrate Companies in Germany, China

The National Security Agency has been a busy bee and it seems that it has agents infiltrated into China, South Korea and even Germany, where they work on programs using “physical subversion” to infiltrate and compromise networks and devices.The Intercept ... [Published Softpedia - Oct 11 2014]
First reported Oct 10 2014 - Updated Oct 10 2014 - 1 reports

NATIONAL SECURITY : Congressman Langevin to Address Cybercrime as Part of URI Honors Colloquium, Oct 21

KINGSTON, R.I. , Oct. 9 -- The University of Rhode Island issued the following news release:Congressman Jim Langevin will headline a panel on Cybercrime at the University of Rhode Island Honors Colloquium , Tuesday, Oct. 21 at 7:30 p.m.The free public ... [Published 4 Traders - Oct 10 2014]
First reported Oct 04 2014 - Updated Oct 04 2014 - 1 reports

Patent Issued for Systems and Methods for Implementing and Scoring Computer Network Defense Exercises

By a News Reporter-Staff News Editor at Bioterrorism Week -- Leidos, Inc. ( Reston, VA ) has been issued patent number 8844044, according to news reporting originating out of Alexandria, Virginia , by NewsRx editors (see also Leidos, Inc. ).The patent's ... [Published 4 Traders - Oct 04 2014]
First reported Oct 01 2014 - Updated Oct 01 2014 - 1 reports

New MITRE Book Outlines Ten Proven Strategies for Computer Network Defense

Best Practices Apply to Government, Industry, Academia and Nonprofit Sector ... [Published Marketwire - Breaking News Releases - Oct 01 2014]
First reported Sep 23 2014 - Updated Sep 23 2014 - 1 reports

Systems and methods for implementing and scoring computer network defense exercises

A process for facilitating a client system defense training exercise implemented over a client-server architecture includes designated modules and hardware for protocol version identification message; registration; profiling; health reporting; vulnerability ... [Published Free Patents Online - Sep 23 2014]
First reported Jun 03 2014 - Updated Jun 03 2014 - 2 reports

Introducing the Digital Security Strategy Series

This is the first in a monthly series of blog posts I will write on strategic digital security. My goal is to introduce, or reinforce, concepts that are not often emphasized in the field of computer network defense. Our community … Continue reading → ... [Published Security Bloggers Network - Jun 03 2014]
First reported May 30 2014 - Updated May 30 2014 - 1 reports

ICF International providing services to Army to counter cyber threats

Fairfax, Va. (UPI) May 27, 2013 -The U.S. Army Research Laboratory has selected ICF International to provide cyber network defense research and services, the company announced Tuesday. The contract covers analytical and engineering services in core ... [Published News About Cyber Warfare - May 30 2014]

Quotes

The Intercept  claims the document states  "The facts contained in [the Sentry Eagle] program constitute a combination of the greatest number of highly sensitive facts related to NSA/CSS’s overall cryptologic mission."
Supplementing the background information on this patent, NewsRx reporters also obtained the inventors' summary information for this patent: "In an embodiment of the present invention, a process for facilitating a client system attack and/or defense training exercise is implemented over a client-server architecture. The process includes: sending a protocol version identification message by a client system including at least one computer to a first server for determining a the protocol version common to both the client computer and the first server; sending a registration request message by the client system to a first server for registering the client computer with the first server; sending a system identification message by the client system to a first server for tracking the client identity; sending a profile message by the first server to the client system in response to successful registration by the client system, the profile message including a list of vulnerabilities with associated vulnerability identifiers (IDs) that the client is to monitor; sending a health message by the client system to the first server at predetermined intervals, the health message including information regarding at least one of client system CPU, memory, hard disk, network and interfaces; sending a vulnerability fixed message by the client system to the first server each time one of the vulnerabilities on the list of vulnerabilities has been fixed, the vulnerability fixed messages including the associated vulnerability ID for each fixed vulnerability; sending a list vulnerabilities message by the first server to the client system, requesting a listing of all current client system vulnerabilities by associated vulnerability ID; sending a list of current vulnerabilities message by the client system to the first server in response to the list vulnerabilities message from the first server; storing details from the profile message, one or more health messages, one or more vulnerability fixed messages and one or more list of current vulnerabilities messages in at least one database associated with the first server; accessing the details stored in at least one database by a second server; applying a set of scoring rules to the accessed details by the second server to determine an objective score for a client system administrator that is indicative of the client system administrator's ability to defend the client system against vulnerabilities."
"ICF is pleased to continue to provide this valuable service to the U S Army Research Laboratory and to help research and develop next-generation tools and techniques that defend against the growing attacks on networks and data" said Bill Christman, vice president for ICF International

More Content

All (19) | News (11) | Reports (0) | Blogs (8) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
NCDOC officer receives Vice Adm. Richard W. May... [Published Norfolk Navy Flagship - Oct 16 2014]
Global CyberLympics champions announced at ISAC... [Published Government Security News - Oct 15 2014]
NSA Agents Physically Infiltrated Communication... [Published HOTforSecurity - Oct 14 2014]
NSA Has Used Covert Operatives in Foreign Compa... [Published AllGov - Oct 13 2014]
NSA’s “Core Secrets” suggests agents inside fir... [Published ArsTechnica - Oct 13 2014]
Core Secrets: NSA Saboteurs in China and Germany [Published ZNet - Oct 12 2014]
NSA Agents Infiltrate Companies in Germany, China [Published Softpedia - Oct 11 2014]
NATIONAL SECURITY : Congressman Langevin to Add... [Published 4 Traders - Oct 10 2014]
Patent Issued for Systems and Methods for Imple... [Published 4 Traders - Oct 04 2014]
New MITRE Book Outlines Ten Proven Strategies f... [Published Marketwire - Breaking News Releases - Oct 01 2014]
Systems and methods for implementing and scorin... [Published Free Patents Online - Sep 23 2014]
Introducing the Digital Security Strategy Series [Published Security Bloggers Network - Jun 03 2014]
Introducing the Digital Security Strategy Series [Published FireEye Blog - Jun 03 2014]
On the Twenty Years Since My USAFA Graduation [Published TaoSecurity - Jun 02 2014]
ICF International providing services to Army to... [Published News About Cyber Warfare - May 30 2014]
ShowMeCon 2014 - Hacking To Get Caught: A Conce... [Published SecurityTube.Net - May 09 2014]
Book Review: Secrets and Lies: Digital Security... [Published Security Bloggers Network - May 05 2014]
Global CyberLympics, the International Cybersec... [Published PRWeb - May 05 2014]
EC-Council, creator of the world famous Certifi... [Published PRWeb - Feb 24 2014]
1
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
NSA Agents Physically Infiltrated Communication... [Published HOTforSecurity - Oct 14 2014]
The latest Snowden leaked documents revealed that the NSA has physically infiltrated and compromised devices and networks from communication companies within China, Germany and South Korea during their “physical subversion” programs. The Intercept ...
New MITRE Book Outlines Ten Proven Strategies f... [Published Marketwire - Breaking News Releases - Oct 01 2014]
Best Practices Apply to Government, Industry, Academia and Nonprofit Sector ...
Introducing the Digital Security Strategy Series [Published Security Bloggers Network - Jun 03 2014]
This is the first in a monthly series of blog posts I will write on strategic digital security. My goal is to introduce, or reinforce, concepts that are not often emphasized in the field of computer network defense. Our community … Continue reading → ...
Introducing the Digital Security Strategy Series [Published FireEye Blog - Jun 03 2014]
This is the first in a monthly series of blog posts I will write on strategic digital security. My goal is to introduce, or reinforce, concepts that are not often emphasized in the field of computer network defense. Our community is dominated by discussions ...
On the Twenty Years Since My USAFA Graduation [Published TaoSecurity - Jun 02 2014]
Twenty years ago today, on 1 June 1994, 1024 of us graduated from the United States Air Force Academy , commissioned as brand new second lieutenants. As of September 2012, over 600 members of the class of 1994 were still in uniform. I expect that ...
1 2
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.