GUÍA DE
CIBERDEFENSAORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO
DE UNA CIBERDEFENSA MILITAR99
26CSIRT: Computer Security Incident Response Team
27https://www.first.org/
28https://www.trusted-introducer.org/index.html
29http://www.egc-group.org/
30Obfuscation is the deliberate modification of a computer program source code to make it difficult to understand keeping the original operation.
31SOFTWARE REVERSE ENGINEERING is a process of deconstruction of apiece of
software to reveal its design, architecture, functions or extract knowledge.
32MACHINE LEARNING is a branch of Artificial Intelligence that studies computer algorithms that automatically improve through experience.
33BLOCKCHAIN
is a growing list of records, called blocks, that are linked using cryptography. Each block contains a cryptographic
hash of the previous block, a timestamp and transaction data.
34BIG DATA is a technology focused on the treatment of data sets too large or complex to be processed by traditional data processing software.
Share with your friends: