Chapter 9. Government Case: Introducing New Technology
Setting the stage
You have been working on a government research and development (R&D) contract to develop and mature a new technology for protecting network-based systems against attacks from intruders, both insiders and hackers, for the past six years. The defenses you invented (and which you have patent applications for) are called active defenses.
The defenses work by first identifying the attack scenario. Attacks are represented next in the form of a state vector, which is designed to capture and communicate as much information about the attack as possible. As the attack unfolds, these state vectors are updated with the dynamics of the attack. The defenses take the information and use ...
Get Software Change Management: Case Studies and Practical Advice now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.