Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Computer scientists' tool fools hackers into sharing keys for better security
- This topic has 0 replies, 1 voice, and was last updated 11 months ago by .
-
Topic
-
Computer scientists have came up with a tool that would help with future cyber attacks. Computer scientists from the University of Texas developed a defense that welcomes hackers instead of blocking them. DEEP-Dig (DEcEPtion DIGing) leads the hackers into a site that is set up as a decoy. The site allows the computer to learn from the hackers’ tactics against future attacks. With the information that is collected from this decoy site, it is then used to train the computer on how to stop any future attacks. Instead of solely looking at the current cybersecurity attacks as a negative, computer scientists are starting to view these as a learning method to better protect computers and software against any attacks in the future, making it harder for hackers. By using the data from the hackers that are on this decoy site, it will help train the machine to better identify an attack.
You must be logged in to reply to this topic.