Cybersecurity - An Agents based Approach?
The DDoS attack using an internet device on October 21, 2016, generated a flurry of suggestions from vast number of pundits. What if the attacks were not limited to social media sites but instead targeted heart monitors to deliver shocks to patients with cardiac arrhythmia? In this article the poten...
Main Author: | |
---|---|
Other Authors: | |
Format: | Article |
Language: | en_US |
Published: |
2017
|
Subjects: | |
Online Access: | http://hdl.handle.net/1721.1/107988 |
_version_ | 1826203674784825344 |
---|---|
author | Datta, Shoumen |
author2 | Massachusetts Institute of Technology. Auto-ID Laboratory |
author_facet | Massachusetts Institute of Technology. Auto-ID Laboratory Datta, Shoumen |
author_sort | Datta, Shoumen |
collection | MIT |
description | The DDoS attack using an internet device on October 21, 2016, generated a flurry of suggestions from vast number of pundits. What if the attacks were not limited to social media sites but instead targeted heart monitors to deliver shocks to patients with cardiac arrhythmia? In this article the potential of personal security agents (PSA) is suggested as a modular tool to model people, process, bits and atoms (objects) with layers to address trust, privacy and security. Can we explore the potential of creating wrappers within these layers to include cognitive firewalls? |
first_indexed | 2024-09-23T12:41:16Z |
format | Article |
id | mit-1721.1/107988 |
institution | Massachusetts Institute of Technology |
language | en_US |
last_indexed | 2025-03-10T10:45:41Z |
publishDate | 2017 |
record_format | dspace |
spelling | mit-1721.1/1079882025-02-28T18:29:45Z Cybersecurity - An Agents based Approach? Datta, Shoumen Massachusetts Institute of Technology. Auto-ID Laboratory cybersecurity, agents, cognitive firewall, AI The DDoS attack using an internet device on October 21, 2016, generated a flurry of suggestions from vast number of pundits. What if the attacks were not limited to social media sites but instead targeted heart monitors to deliver shocks to patients with cardiac arrhythmia? In this article the potential of personal security agents (PSA) is suggested as a modular tool to model people, process, bits and atoms (objects) with layers to address trust, privacy and security. Can we explore the potential of creating wrappers within these layers to include cognitive firewalls? Personal Security Agents as Modular Models representing People, Process, Atoms and Bits 2017-04-09T18:06:11Z 2017-04-09T18:06:11Z 2017-04-09 Article http://hdl.handle.net/1721.1/107988 en_US Attribution-NonCommercial-NoDerivs 3.0 United States http://creativecommons.org/licenses/by-nc-nd/3.0/us/ application/pdf application/octet-stream |
spellingShingle | cybersecurity, agents, cognitive firewall, AI Datta, Shoumen Cybersecurity - An Agents based Approach? |
title | Cybersecurity - An Agents based Approach? |
title_full | Cybersecurity - An Agents based Approach? |
title_fullStr | Cybersecurity - An Agents based Approach? |
title_full_unstemmed | Cybersecurity - An Agents based Approach? |
title_short | Cybersecurity - An Agents based Approach? |
title_sort | cybersecurity an agents based approach |
topic | cybersecurity, agents, cognitive firewall, AI |
url | http://hdl.handle.net/1721.1/107988 |
work_keys_str_mv | AT dattashoumen cybersecurityanagentsbasedapproach |