
CyBOK — The Cybersecurity Body of Knowledge
Podcast de University of Bristol and the CyberWire
Disfruta 30 días gratis
4,99 € / mes después de la prueba.Cancela cuando quieras.

Más de 1 millón de oyentes
Podimo te va a encantar, y no sólo a ti
Valorado con 4,7 en la App Store
Acerca de CyBOK — The Cybersecurity Body of Knowledge
A comprehensive Body of Knowledge to inform and underpin education and professional training for the cyber security sector.
Todos los episodios
24 episodios
Cybersecurity, like other industries, has seen an explosion in the use of artificial intelligence (AI) and machine learning (ML) technologies in recent years. AI and ML can help to automate tasks. Data-driven approaches in general can draw patterns from vast volumes of data far quicker than humans are can. This episode summarises the state of AI for security at the time of writing and highlights some of the considerations to guide whether it is an appropriate approach for a given problem, common pitfalls to avoid, and human-AI ecosystems.AI is challenged by several open research areas including lack of transparency, robustness to concept drift, and the security of AI systems themselves. This topic guide is for those looking to build and/or procure AI solutions to use for cybersecurity applications. Some sections are more relevant for those building and others to those procuring solutions. We speak with CyBOK AI for Security author Matilda Rhode for an overview of the topic.

The Security Economics Knowledge Guide introduces some of the most impactful ways economics has helped to shed light on cybersecurity problems and frame solutions that blend private and public action. The guide focuses on the organizational, rather than individual, perspective, which is where the majority of scholarly activity has focused. The author of this knowledge guides shares canonical security failures from an economic perspective, describes key measurement challenges, reviews firm-level approaches to improving cybersecurity, and discusses available public-policy options. We speak with CyBOK Security Economics author Tyler Moore for an overview of the topic.

Machine Learning (ML) has rapidly become a fundamental technology that underpins count- less applications, from natural language processing and computer vision to fraud detection and personalized recommendations. In recent years, there has been a growing understanding of how to use ML in security contexts, leading to the development of advanced tools and techniques for detecting and preventing malicious activities. However, the security and privacy aspects of ML itself remain less understood, posing new challenges and opportunities for researchers and practitioners. This Cybersecurity Body of Knowledge (CyBoK) Knowledge Guide (KG) aims to define the scope of adversarial machine learning and privacy in ML and provide an overview of the state- of-the-art in these rapidly evolving fields. Our focus is on the key challenges, open problems, and promising solutions that have emerged in the context of securing and preserving the privacy of ML systems. We speak with CyBOK Security and Privacy of AI authors Lorenzo Cavallaro and Emiliano De Cristofaro for an overview of the topic.

The ubiquity of networking allows us to connect all sorts of devices and gain unprecedented access to a whole range of applications and services anytime, anywhere. However, our heavy reliance on networking technology also makes it an attractive target for malicious users who are willing to compromise the security of our communications and/or cause disruption to services that are critical for our day-to-day survival in a connected world. The Network Security 2.0 knowledge area explains the challenges associated with securing a network under a variety of attacks for a number of networking technologies and widely used security protocols, along with emerging security challenges and solutions. We speak with CyBOK Network Security 2.0 author Christian Rossow for an overview of the topic.

The Formal Methods knowledge area surveys the most relevant topics in formal methods for security. As a discipline, formal methods address foundations, methods and tools, based on mathematics and logic, for rigourously developing and reasoning about computer systems, whether they be software, hardware, or a combination of the two. The application of formal methods to security has emerged over recent decades as a well-established research area focused on the specification and proof of security properties of systems, their components, and protocols. We speak with CyBOK Formal Methods author David Basin for an overview of the topic.

Valorado con 4,7 en la App Store
Disfruta 30 días gratis
4,99 € / mes después de la prueba.Cancela cuando quieras.
Podcasts exclusivos
Sin anuncios
Podcast gratuitos
Audiolibros
20 horas / mes