Difference between revisions of "Cybersecurity Frameworks, Architectures & Roadmaps"
| Line 1: | Line 1: | ||
[http://www.youtube.com/results?search_query=cyber+security+defense+RSA+malware+detect+framework+architecture+roadmap+artificial+intelligence+deep+learning Youtube search...] | [http://www.youtube.com/results?search_query=cyber+security+defense+RSA+malware+detect+framework+architecture+roadmap+artificial+intelligence+deep+learning Youtube search...] | ||
| − | * [[Cybersecurity]] | + | |
| − | ** [[ | + | * [[Case Studies]] |
| + | ** [[Risk, Compliance and Regulation]] | ||
| + | *** [[Cybersecurity]] | ||
| + | ** [[Government Services]] | ||
** [[Defense]] | ** [[Defense]] | ||
| − | ** [[Offense - Adversarial Threats/Attacks | + | * [[Cybersecurity References]] |
| − | + | * [[Offense - Adversarial Threats/Attacks]] | |
* [[Capabilities]] | * [[Capabilities]] | ||
* [http://www.nist.gov/cyberframework NIST Cybersecurity Framework] - consists of standards, guidelines, and best practices to manage cybersecurity-related risk. | * [http://www.nist.gov/cyberframework NIST Cybersecurity Framework] - consists of standards, guidelines, and best practices to manage cybersecurity-related risk. | ||
| Line 18: | Line 21: | ||
Not necessarily restricted to artificial intelligence-based solutions. | Not necessarily restricted to artificial intelligence-based solutions. | ||
| − | |||
<youtube>zokpELp9D9s</youtube> | <youtube>zokpELp9D9s</youtube> | ||
<youtube>5LyY_gHzc64</youtube> | <youtube>5LyY_gHzc64</youtube> | ||
Revision as of 07:39, 15 July 2020
- Case Studies
- Cybersecurity References
- Offense - Adversarial Threats/Attacks
- Capabilities
- NIST Cybersecurity Framework - consists of standards, guidelines, and best practices to manage cybersecurity-related risk.
- NIST FedRAMP security for the cloud
- United States Computer Emergency Readiness Team (US-CERT)
- Cybersecurity Reference Architecture | Microsoft
- ISO/IEC 15408-1 ISO/IEC Information Technology Task Force (ITTF)
- FIPS 140-2 Security Requirements for Cryptographic Modules
- How STIX, TAXII and CybOX Can Help With Standardizing Threat Information
- OASIS Cyber Threat Intelligence (CTI) TC OpenC2
- Using the Cybersecurity Framework
Not necessarily restricted to artificial intelligence-based solutions.