Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
HBGary leaks - confidential brochure from Qosmos

HBGary leaks - confidential brochure from Qosmos

Ratings: (0)|Views: 844|Likes:
Published by fhimtcom
This brochure is intended to sell Qosmos nationwide monitoring and surveillance technology. Since those are illegal in most democracies, it is obviouly intended for various dictatorship. It was found in the HBgary leaks after Anonymous' attack on the firm's CEO, who followed HBGary attempt at revealing various Anonymous identities.
This brochure is intended to sell Qosmos nationwide monitoring and surveillance technology. Since those are illegal in most democracies, it is obviouly intended for various dictatorship. It was found in the HBgary leaks after Anonymous' attack on the firm's CEO, who followed HBGary attempt at revealing various Anonymous identities.

More info:

Categories:Types, Brochures
Published by: fhimtcom on Sep 01, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

04/05/2012

pdf

text

original

 
 
Government-WideCyber Security
Leveraging Network Intelligence Technology
April 2009White PaperEnabling True Network Intelligence Everywhere
 
White Paper
 Government-Wide Cyber Security 2
Confidential
Executive Summary
Governments and multi-government organizations can better support IT network securityacross applications and government functions with a common technology platform leveragingNetwork Intelligence building blocks.
IT security continues to be the greatest challenge facing government CIOs worldwide. Most expertsagree that governments require stronger partnerships between the public and private sectors for bothbetter protection of government IT systems from
intruders and for greater visibility into operators’
network traffic to fight crime. However, government systems and intelligence activities constitute avery sensitive information environment. Governments must proceed with caution when formingtechnology partnerships for hardening their IT network security. Melissa E. Hathaway, who in February
2009 was named to be the Obama Administration’s top cyber security official, points out how
government IT organizations should be asking questions such as:Who designed the security technology?Who built the technology?Who operates and maintains the technology?Who upgrades the technology?Who retires the technology?
1
 Commercial-Off-The-Shelf (COTS) products are not always suited for government network securityneeds. Governments can better support network security across applications and governmentfunctions with a common technology platform consisting of reusable technology building blocks. Sucha global approach would enable government organizations to
control 
the development,
performance 
 and maintenance of security applications, while preserving the
confidentiality 
of security mechanismsfor detecting cyber criminals and protecting information. Qosmos Network Intelligence provides thiscapability.Qosmos Network Intelligence provides this capability with technology to extract detailed IP metadatafrom network traffic. The Qosmos technology building blocks enhance situational awareness and givecyber security specialists a complete view of network status and potential threats. These newcapabilities allow governments to improve preventive measures, protect network assets in real-time,and perform more accurate post-mortem analysis when attacks occur.This document describes:The security challenges facing government IT organizationsThe prudence of a pragmatic global approach to cyber securityThe value of reusing technology building blocks and leveraging IP metadataHow governments at the forefront of network protection are using Network Intelligencetechnology 
1
 
Melissa E. Hathaway, “Cyber Security: An Economic and National Security Crisis,”
Intelligencer: Journal of U.S. Intelligence Studies,
Volume 16, No.2, Fall 2008
 
White Paper
 Government-Wide Cyber Security 3
Confidential
Contents

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->