Difference between revisions of "U.S. Department of Homeland Security (DHS)"

From
Jump to: navigation, search
m
m
Line 11: Line 11:
 
[https://www.bing.com/news/search?q=DHS+Department+Homeland+Security+Cybersecurity+AI&qft=interval%3d%228%22 ...Bing News]
 
[https://www.bing.com/news/search?q=DHS+Department+Homeland+Security+Cybersecurity+AI&qft=interval%3d%228%22 ...Bing News]
  
 +
* [[Government Services]]
 +
** [[National Institute of Standards and Technology (NIST)]]
 +
** [[U.S. Department of Homeland Security (DHS)]]
 +
** [[Defense]]
 
* [[Case Studies]]
 
* [[Case Studies]]
 
** [[Risk, Compliance and Regulation]]
 
** [[Risk, Compliance and Regulation]]
Line 18: Line 22:
 
**** [[Cybersecurity Frameworks, Architectures & Roadmaps]]
 
**** [[Cybersecurity Frameworks, Architectures & Roadmaps]]
 
**** [[Cybersecurity Companies/Products]]
 
**** [[Cybersecurity Companies/Products]]
** [[Government Services]]
 
*** [[National Institute of Standards and Technology (NIST)]]
 
*** [[Defense]]
 
 
* [[Capabilities]]
 
* [[Capabilities]]
 
* [[Offense - Adversarial Threats/Attacks]]
 
* [[Offense - Adversarial Threats/Attacks]]

Revision as of 05:17, 5 May 2023

YouTube ... Quora ...Google search ...Google News ...Bing News



Teaser for AUDREY Hastings Experiment
Assistant for Understanding Data through Reasoning, Extraction, and Synthesis (AUDREY) The sheer volume of data from next-generation communication tools and sensors risks overwhelming or distracting first responders from their critical activities. As a result, first responders may make the wrong decisions, not because they lack relevant data, but because they are unable to quickly extract key insight from this flood of information. Information overload creates obstacles for first responders to perform their duties safely and efficiently. To learn more about AUDREY, visit: https://go.usa.gov/xPPBU

Local company uses technology to stop bad drones
A local company is using technology to stop drones used by cartels.

Post-Quantum Cryptography (PQC)

In cryptography, post-quantum cryptography (PQC) (sometimes referred to as quantum-proof, quantum-safe or quantum-resistant) refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against a cryptanalytic attack by a quantum computer. The problem with currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic-curve discrete logarithm problem. All of these problems could be easily solved on a sufficiently powerful quantum computer running Shor's algorithm. Even though current quantum computers lack processing power to break any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several workshops on Quantum Safe Cryptography hosted by the European Telecommunications Standards Institute (ETSI) and the Institute for Quantum Computing. In contrast to the threat quantum computing poses to current public-key algorithms, most current symmetric cryptographic algorithms and hash functions are considered to be relatively secure against attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography. - Wikipedia



Quantum Apocalypse: Store Now, Decrypt Later (DNDL) ... stealing data now to decrypt it in future, as quantum computing could render modern encryption methods obsolete



NIST Standardization process for PQC

  • Post-Quantum Cryptography (PQC) | NIST
  • NIST winners and will ratify standards in 2024
  • Multiple global rounds since 2015 led to NIST announcing winners in July 22 - four algorithms:
    • CRYSTALS-KYBER was chosen by NIST as the new standard for public-key encryption/KEMs
    • Falcon, CRYSTALS-Dilithium and SPHINCS+ will all be standardized for digital signatures
  • There are more algorithms under consideration too, so the process continues



National Security Agency (NSA) - Cybersecurity