HOME
*



picture info

Malware Information Sharing Platform
MISP Threat Sharing (MISP) is an open source threat intelligence platform. The project develops utilities and documentation for more effective threat intelligence, by sharing indicators of compromise. There are several organizations who run MISP instances, who are listed on the website. History This project started around June 2011 when Christophe Vandeplas had a frustration that way too many Indicators of Compromise (IOCs) were shared by email, or in pdf documents and were not parsable by automatic machines. So at home he started to play around with CakePHP and made a proof of concept of his idea. He called it CyDefSIG: Cyber Defence Signatures. Mid July 2011 he presented his personal project at work ( Belgian Defence) where the feedback was rather positive. After giving access to CyDefSIG running on his personal server the Belgian Defence started to use CyDefSIG officially starting mid August 2011. Christophe was then allowed to spend some time on CyDefSIG during his work- ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Affero General Public License
The Affero General Public License (Affero GPL and informally Affero License) is a free software license. The first version of the Affero General Public License (AGPLv1), was published by Affero, Inc. in March 2002, and based on the GNU General Public License, version 2 (GPLv2). The second version (AGPLv2) was published in November 2007, as a transitional license to allow an upgrade path from AGPLv1 to the GNU Affero General Public License (a variant of the original Affero GPL license that is compatible with GPLv3). Both versions of the Affero GPL were designed to close a perceived application service provider (ASP) loophole in the ordinary GPL, where, by using but not distributing the software, the copyleft provisions are not triggered. Each version differs from the version of the GNU GPL on which it is based in having an added provision addressing use of software over a computer network. This provision requires that the full source code be made available to any network user of t ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Open Source
Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use the source code, design documents, or content of the product. The open-source model is a decentralized software development model that encourages open collaboration. A main principle of open-source software development is peer production, with products such as source code, blueprints, and documentation freely available to the public. The open-source movement in software began as a response to the limitations of proprietary code. The model is used for projects such as in open-source appropriate technology, and open-source drug discovery. Open source promotes universal access via an open-source or free license to a product's design or blueprint, and universal redistribution of that design or blueprint. Before the phrase ''open source'' became widely adopted, developers and producers have used a variety of other terms. ''Open source'' gained ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Threat Intelligence Platform
Threat Intelligence Platform (TIP) is an emerging technology discipline that helps organizations aggregate, correlate, and analyze threat data from multiple sources in real time to support defensive actions. TIPs have evolved to address the growing amount of data generated by a variety of internal and external resources (such as system logs and threat intelligence feeds) and help security teams identify the threats that are relevant to their organization. By importing threat data from multiple sources and formats, correlating that data, and then exporting it into an organization’s existing security systems or ticketing systems, a TIP automates proactive threat management and mitigation. A true TIP differs from typical enterprise security products in that it is a system that can be programmed by outside developers, in particular, users of the platform. TIPs can also use APIs to gather data to generate configuration analysis, Whois information, reverse IP lookup, website content a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Indicator Of Compromise
Indicator of compromise (IoC) in computer forensics is an artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion. Types of indication Typical IoCs are virus signatures and IP addresses, MD5 hashes of malware files, or URLs or domain names of botnet command and control servers. After IoCs have been identified via a process of incident response and computer forensics, they can be used for early detection of future attack attempts using intrusion detection systems and antivirus software. Automation There are initiatives to standardize the format of IoC descriptors for more efficient automated processing. Known indicators are usually exchanged within the industry, where the Traffic Light Protocol is being used. See also * AlienVault * Mandiant * Malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Federation (information Technology)
A federation is a group of computing or network providers agreeing upon standards of operation in a collective fashion. The term may be used when describing the inter-operation of two distinct, formally disconnected, telecommunications networks that may have different internal structures. The term "federated cloud" refers to facilitating the interconnection of two or more geographically separate computing clouds. The term may also be used when groups attempt to delegate collective authority of development to prevent fragmentation. In a telecommunication interconnection, the internal ''modi operandi'' of the different systems are irrelevant to the existence of a federation. Joining two distinct networks: *Yahoo! and Microsoft announced that Yahoo! Messenger and MSN Messenger would be interoperable. Collective authority: *The MIT X Consortium was founded in 1988 to prevent fragmentation in development of the X Window System. *OpenID, a form of federated identity. In networkin ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




CakePHP
CakePHP is an open-source web framework. It follows the model–view–controller (MVC) approach and is written in PHP, modeled after the concepts of Ruby on Rails, and distributed under the MIT License. CakePHP uses well-known software engineering concepts and software design patterns, such as convention over configuration, model–view–controller, active record, association data mapping, and front controller. History CakePHP started in April 2005, when a Polish programmer Michal Tatarynowicz wrote a minimal version of a rapid application development framework in PHP, dubbing it Cake. He published the framework under the MIT license, and opened it up to the online community of developers. In December 2005, L. Masters and G. J. Woodworth founded the Cake Software Foundation to promote development related to CakePHP. Version 1.0 was released in May 2006. One of the project's inspirations was Ruby on Rails, using many of its concepts. The community has since grown and spawne ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Belgian Armed Forces
The Belgian Defense Forces ( nl, Defensie; french: La Défense) is the national military of Belgium. The King of the Belgians is the commander-in-chief of the Armed Forces. The Belgian Armed Forces was established after Belgium became independent in October 1830. Since then, the Belgian armed forces have fought in World War I, World War II, the Cold War (Korean War and the Belgian occupation of the Federal Republic of Germany), Kosovo, Rwanda, Somalia and Afghanistan. The Armed Forces comprise five branches: the Land Component, the Air Component, the Marine Component, the Cyber Component and the Medical Component. History Establishment When Belgium broke away from the Netherlands in 1830 it was initially expected that a neutral buffer state, with its borders guaranteed by France, Britain and Prussia, could avoid the need for an expensive permanent military force, relying instead on the part-time militia of the existing ''Garde Civique'' (Civil Guard). The need for a re ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


NATO
The North Atlantic Treaty Organization (NATO, ; french: Organisation du traité de l'Atlantique nord, ), also called the North Atlantic Alliance, is an intergovernmental military alliance between 30 member states – 28 European and two North American. Established in the aftermath of World War II, the organization implemented the North Atlantic Treaty, signed in Washington, D.C., on 4 April 1949. NATO is a collective security system: its independent member states agree to defend each other against attacks by third parties. During the Cold War, NATO operated as a check on the perceived threat posed by the Soviet Union. The alliance remained in place after the dissolution of the Soviet Union and has been involved in military operations in the Balkans, the Middle East, South Asia, and Africa. The organization's motto is ''animus in consulendo liber'' (Latin for "a mind unfettered in deliberation"). NATO's main headquarters are located in Brussels, Belgium, while NATO ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


CC BY-SA Icon
CC, cc, or C-C may refer to: Arts, entertainment, and media Fictional characters * C.C. (''Code Geass''), a character in the ''Code Geass'' anime series, pronounced "C-two" * C.C. Babcock, a character in the American sitcom ''The Nanny'' * Comedy Chimp, a character in ''Sonic Boom'', called "CC" by Doctor Eggman Gaming * ''Command & Conquer'' (''C&C''), a series of real-time strategy games and the first game in the series * Crowd control (video gaming), the ability to limit the number of mobs actively fighting during an encounter Other arts, music, entertainment, and media * Cannibal Corpse, an American death metal band. * CC Media Holdings, the former name of iHeartMedia * Closed captioning, a process of displaying text on a visual display, such as a TV screen * Comedy Central, an American television network (URL is cc.com) Brands and enterprises Food and drink * Canadian Club, a brand of whisky * CC's, a tortilla chip brand in Australia Other companies * Stylized interlock ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


European Union
The European Union (EU) is a supranational political and economic union of member states that are located primarily in Europe. The union has a total area of and an estimated total population of about 447million. The EU has often been described as a '' sui generis'' political entity (without precedent or comparison) combining the characteristics of both a federation and a confederation. Containing 5.8per cent of the world population in 2020, the EU generated a nominal gross domestic product (GDP) of around trillion in 2021, constituting approximately 18per cent of global nominal GDP. Additionally, all EU states but Bulgaria have a very high Human Development Index according to the United Nations Development Programme. Its cornerstone, the Customs Union, paved the way to establishing an internal single market based on standardised legal framework and legislation that applies in all member states in those matters, and only those matters, where the states have agreed to act ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Connecting Europe Facility
The Connecting Europe Facility (CEF) is a European Union fund established in 2014 for infrastructure investments (in particular the Trans-European Networks) across the union in transport, energy, digital and telecommunication projects, which aims at a greater connectivity between EU member states. It operates through grants, financial guarantees and project bonds. It is run by the Innovation and Networks Executive Agency and then by the Climate, Infrastructure and Environment Executive Agency. CEF Digital CEF Digital is the digital infrastructure arm of CEF. A large portion of CEF Digital was split off in 2021 to form the Digital Europe Programme The Digital Europe Programme (DEP) is a fund of the European Union which supports the completion of the Digital Single Market by connecting Europe through 'digital bridges' (Digital Service Infrastructures) for the benefit of citizens, businesses an .... The actions which remain assigned to CEF Digital after 2021, include: *Deploying v ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Data Security
Data security means protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach. Technologies Disk encryption Disk encryption refers to encryption technology that encrypts data on a hard disk drive. Disk encryption typically takes form in either software (see disk encryption software) or hardware (see disk encryption hardware). Disk encryption is often referred to as on-the-fly encryption (OTFE) or transparent encryption. Software versus hardware-based mechanisms for protecting data Software-based security solutions encrypt the data to protect it from theft. However, a malicious program or a hacker could corrupt the data to make it unrecoverable, making the system unusable. Hardware-based security solutions prevent read and write access to data, which provides very strong protection against tampering and unauthorized access. Hardware-based security or assiste ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]