Cybersecurity: Difference between revisions
No edit summary |
|||
| Line 12: | Line 12: | ||
*In 2011, researchers at Lockheed Martin standardized cybersecurity jargon with the publication of their white paper, "Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains."<ref>[https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pdf Eric M. Hutchins, Michael J. Cloppert, & Rohan M. Amin.2011."Lockheed Martin Kill Chain.]</ref> | *In 2011, researchers at Lockheed Martin standardized cybersecurity jargon with the publication of their white paper, "Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains."<ref>[https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pdf Eric M. Hutchins, Michael J. Cloppert, & Rohan M. Amin.2011."Lockheed Martin Kill Chain.]</ref> | ||
*In 2013, nonspecialists became more aware of nation-state cyberattacks with Mandiant's release of the [[APT1 Report]], which outlined how China was able to quickly steal intellectual property from US firms. | *In 2013, nonspecialists became more aware of nation-state cyberattacks with Mandiant's release of the [[APT1 Report]], which outlined how China was able to quickly steal intellectual property from US firms. | ||
*In 2014, NIST released its first cybersecurity framework, which conceptualized how to identify, protect, detect, respond, and recover from attacks.<ref>[https://www.nist.gov/cyberframework Cyberframework, NIST]</ref> | *In 2014, [[NIST]] released its first cybersecurity framework, which conceptualized how to identify, protect, detect, respond, and recover from attacks.<ref>[https://www.nist.gov/cyberframework Cyberframework, NIST]</ref> | ||
==Government Involvement== | ==Government Involvement== | ||