Distributed Cybersecurity Strategy, applying Intelligence Operation concept through data collection and analysis

Autores
Gallardo Urbini, Ignacio Martín; Bazán, Patricia Alejandra; Venosa, Paula; Rio, Nicolás del
Año de publicación
2021
Idioma
inglés
Tipo de recurso
documento de conferencia
Estado
versión publicada
Descripción
This document presents a line of doctoral research that proposes a cybersecurity strategy that has not been formally standardized up to now, based on knowledge of defense intelligence operations, and applying a dynamic approach, in a context of threat risk, anticipating its effectiveness . In this way, change the current approach, leaving aside the old concept of "walled" defense, for a more innovative one, where information collectors or "spies" infiltrate "unknown terrain" or external networks to extract data and information, learn from context, analyze and detect patterns, be willing to share the knowledge, and then be able to make defensive, deterrent, or offensive decisions in real time.
Facultad de Informática
Materia
Ciencias Informáticas
Cybersecurity
Big Data
Data Intelligence
Multivendor
Nivel de accesibilidad
acceso abierto
Condiciones de uso
http://creativecommons.org/licenses/by-nc-sa/4.0/
Repositorio
SEDICI (UNLP)
Institución
Universidad Nacional de La Plata
OAI Identificador
oai:sedici.unlp.edu.ar:10915/125152

id SEDICI_d8be575236d20399d0beacb663a87579
oai_identifier_str oai:sedici.unlp.edu.ar:10915/125152
network_acronym_str SEDICI
repository_id_str 1329
network_name_str SEDICI (UNLP)
spelling Distributed Cybersecurity Strategy, applying Intelligence Operation concept through data collection and analysisGallardo Urbini, Ignacio MartínBazán, Patricia AlejandraVenosa, PaulaRio, Nicolás delCiencias InformáticasCybersecurityBig DataData IntelligenceMultivendorThis document presents a line of doctoral research that proposes a cybersecurity strategy that has not been formally standardized up to now, based on knowledge of defense intelligence operations, and applying a dynamic approach, in a context of threat risk, anticipating its effectiveness . In this way, change the current approach, leaving aside the old concept of "walled" defense, for a more innovative one, where information collectors or "spies" infiltrate "unknown terrain" or external networks to extract data and information, learn from context, analyze and detect patterns, be willing to share the knowledge, and then be able to make defensive, deterrent, or offensive decisions in real time.Facultad de Informática2021info:eu-repo/semantics/conferenceObjectinfo:eu-repo/semantics/publishedVersionObjeto de conferenciahttp://purl.org/coar/resource_type/c_5794info:ar-repo/semantics/documentoDeConferenciaapplication/pdf51-54http://sedici.unlp.edu.ar/handle/10915/125152enginfo:eu-repo/semantics/altIdentifier/isbn/978-950-34-2016-4info:eu-repo/semantics/reference/hdl/10915/121564info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc-sa/4.0/Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-09-03T11:02:13Zoai:sedici.unlp.edu.ar:10915/125152Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-09-03 11:02:13.915SEDICI (UNLP) - Universidad Nacional de La Platafalse
dc.title.none.fl_str_mv Distributed Cybersecurity Strategy, applying Intelligence Operation concept through data collection and analysis
title Distributed Cybersecurity Strategy, applying Intelligence Operation concept through data collection and analysis
spellingShingle Distributed Cybersecurity Strategy, applying Intelligence Operation concept through data collection and analysis
Gallardo Urbini, Ignacio Martín
Ciencias Informáticas
Cybersecurity
Big Data
Data Intelligence
Multivendor
title_short Distributed Cybersecurity Strategy, applying Intelligence Operation concept through data collection and analysis
title_full Distributed Cybersecurity Strategy, applying Intelligence Operation concept through data collection and analysis
title_fullStr Distributed Cybersecurity Strategy, applying Intelligence Operation concept through data collection and analysis
title_full_unstemmed Distributed Cybersecurity Strategy, applying Intelligence Operation concept through data collection and analysis
title_sort Distributed Cybersecurity Strategy, applying Intelligence Operation concept through data collection and analysis
dc.creator.none.fl_str_mv Gallardo Urbini, Ignacio Martín
Bazán, Patricia Alejandra
Venosa, Paula
Rio, Nicolás del
author Gallardo Urbini, Ignacio Martín
author_facet Gallardo Urbini, Ignacio Martín
Bazán, Patricia Alejandra
Venosa, Paula
Rio, Nicolás del
author_role author
author2 Bazán, Patricia Alejandra
Venosa, Paula
Rio, Nicolás del
author2_role author
author
author
dc.subject.none.fl_str_mv Ciencias Informáticas
Cybersecurity
Big Data
Data Intelligence
Multivendor
topic Ciencias Informáticas
Cybersecurity
Big Data
Data Intelligence
Multivendor
dc.description.none.fl_txt_mv This document presents a line of doctoral research that proposes a cybersecurity strategy that has not been formally standardized up to now, based on knowledge of defense intelligence operations, and applying a dynamic approach, in a context of threat risk, anticipating its effectiveness . In this way, change the current approach, leaving aside the old concept of "walled" defense, for a more innovative one, where information collectors or "spies" infiltrate "unknown terrain" or external networks to extract data and information, learn from context, analyze and detect patterns, be willing to share the knowledge, and then be able to make defensive, deterrent, or offensive decisions in real time.
Facultad de Informática
description This document presents a line of doctoral research that proposes a cybersecurity strategy that has not been formally standardized up to now, based on knowledge of defense intelligence operations, and applying a dynamic approach, in a context of threat risk, anticipating its effectiveness . In this way, change the current approach, leaving aside the old concept of "walled" defense, for a more innovative one, where information collectors or "spies" infiltrate "unknown terrain" or external networks to extract data and information, learn from context, analyze and detect patterns, be willing to share the knowledge, and then be able to make defensive, deterrent, or offensive decisions in real time.
publishDate 2021
dc.date.none.fl_str_mv 2021
dc.type.none.fl_str_mv info:eu-repo/semantics/conferenceObject
info:eu-repo/semantics/publishedVersion
Objeto de conferencia
http://purl.org/coar/resource_type/c_5794
info:ar-repo/semantics/documentoDeConferencia
format conferenceObject
status_str publishedVersion
dc.identifier.none.fl_str_mv http://sedici.unlp.edu.ar/handle/10915/125152
url http://sedici.unlp.edu.ar/handle/10915/125152
dc.language.none.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv info:eu-repo/semantics/altIdentifier/isbn/978-950-34-2016-4
info:eu-repo/semantics/reference/hdl/10915/121564
dc.rights.none.fl_str_mv info:eu-repo/semantics/openAccess
http://creativecommons.org/licenses/by-nc-sa/4.0/
Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)
eu_rights_str_mv openAccess
rights_invalid_str_mv http://creativecommons.org/licenses/by-nc-sa/4.0/
Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)
dc.format.none.fl_str_mv application/pdf
51-54
dc.source.none.fl_str_mv reponame:SEDICI (UNLP)
instname:Universidad Nacional de La Plata
instacron:UNLP
reponame_str SEDICI (UNLP)
collection SEDICI (UNLP)
instname_str Universidad Nacional de La Plata
instacron_str UNLP
institution UNLP
repository.name.fl_str_mv SEDICI (UNLP) - Universidad Nacional de La Plata
repository.mail.fl_str_mv alira@sedici.unlp.edu.ar
_version_ 1842260520255619072
score 13.13397