CPNI

Results: 107



#Item
51Computing / Malware / Advanced persistent threat / Botnet / Internet security / Antivirus software / Attack / Stuxnet / Trojan horse / Computer network security / Cyberwarfare / Computer security

Hacker and laptop waiting for something

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-04-14 06:39:28
52Security / Spamming / Hacking / Malware / Botnet / Denial-of-service attack / Zero-day attack / Threat / Antivirus software / Cyberwarfare / Computer network security / Computer security

Command & Control Understanding, Denying and Detecting Joseph Gardiner Marco Cova Shishir Nagaraja February 2014

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-06-10 10:29:41
53Computer security / Cyberwarfare / Crime prevention / Intelligence / Threat / Military intelligence / Information security / Database activity monitoring / Security / Computer network security / National security

14852_PIANOS_infographic_v5

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-04-14 06:51:18
54Security / Malware / Honeypot / Password / Zero-day attack / Secure Shell / Computer security / Operation Aurora / Keystroke logging / Computer network security / Cyberwarfare / Cybercrime

Detecting and Deterring Data Exfiltration Guide for Implementers February 2014 MWR would like to acknowledge the help and

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-06-10 10:45:29
55Computer network security / Public safety / Malware / BAE Systems / Computer security / Cyberwarfare / Password / Surveillance / Denial-of-service attack / Security / Crime prevention / National security

Applied Intelligence white

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-06-10 10:23:26
56Antivirus software / Computing / Cyberwarfare / Computer security / Computer network security / Malware / Botnet

TRAINING DATA The goal of the detection algorithms is to use training data in order to efficiently tell whether a given set of intercepted communication data contains messages to or from a target C2 network.

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-04-14 06:44:40
57Security / Fast flux / Traffic flow / Tor / Malware / Computer security / Traffic classification / Deep content inspection / Computer network security / Computing / Internet

Command & Control Key facts Formation and use of a Command and Control (C&C) system is an essential part of remotely-conducted cyber attacks. C&C is used to instruct compromised machines to perform malicious activity—C

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-04-14 06:43:37
58Internet / Computer security / Network performance / Internet privacy / Proxy server / Data security / Malware / Internet security / Firewall / Computer network security / Computing / Computer networking

Command and Control (C2): Key Facts Modern advanced attack software often communicates and receives instructions from remote machines on the Internet – this communication path is called a Command and Control (C2) chann

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-04-14 06:39:50
59Computer network security / Crime prevention / National security / Espionage / Steganography / Information security / Malware / Data loss prevention software / Threat / Security / Computer security / Cyberwarfare

Detecting and Preventing Data Exfiltration Contributors: Professor Awais Rashid, Dr. Rajiv Ramdhany, Matthew Edwards, Sarah Mukisa Kibirige, Dr. Ali Babar, Professor David Hutchison, Security Lancaster, Lancaster Univers

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-04-14 06:54:44
60Malware

PDF Document

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-04-14 06:41:55
    UPDATE