This report assesses current (public domain) cyber security practices with respect to cyber indications and warnings. The information collected is in preparation for evaluation of the advantages of applying HPC technology to cybersecurity, as well as to identify other advances required to properly address this problem space.
This report assesses current (public domain) cyber security practices with respect to cyber indications and warnings. The information collected is in ...
U. S. Department of Energy National Nuclear Security Administration Sandia National Laboratories
Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats-a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously.
Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats....