Dynamic Antidote, all European must do like immune system in human body

Project Description

Developer Systems BI ERP CRM. Dynamic Antidote, all European must do like immune system in human body

all European must do like immune system in human body

Is real, terrorism and cybercrime have as objective all Europe,

"We are dealing with thousands of potentially radicalized individuals who could carry out those kind of attacks,"

...

https://www.youtube.com/watch?v=5CzPOm-MUNI

Europol chief on terrorism: Internet more dangerous than Schengen | Conflict Zone

https://www.facebook.com/dw.conflictzone/

and all European must do like immune system in human body

with the technology of each citizen european as potential agent:

smartphone, laptop, internet, social net, 

...

https://www.youtube.com/watch?v=mnKq9l4Sjro

Step up to the Cognitive Era with Watson for Cyber Security

...

https://www.youtube.com/watch?v=dmuj72Pqxaw

Ginni Rometty - New Ways of Thinking about Enterprise Security

...

Dynamic Antidote

by Ricardo Dolinski Garrido


What is it?

Dynamic antidote online for each threat against cybercrime attacks

How it Works

Applying cognitive compute located in clouds computing in quantum computers would be possible to track online patterns of threat, apply dynamic obfuscation cognitive in real time of the recurrent threats in its pattern identified, isolate source of threat and isolate its corresponding action; then it would be possible develop dynamic antidote online for each threat pattern.

 

A proposed flow in the process of Dynamic Antidote would be to:

 

1.a.- Identify threat patterns happening with IBM Watson.

1.b.- Hand it off to IBM Business Process Manager (BPM).

1.c.- Notify System Administrators and the System itself in real time with IBM Business Process Manager (BPM) & Business Operations Connect when threat patterns are discovered / identified.

 

2.a.- Identify initiate actions using IBM Business Process Manager (BPM) & IBM Watson.

2.b.- Apply Dynamic Obfuscation Cognitive in real time of the recurrent threats in its pattern identified to isolate source of threat and isolate its corresponding action.

2.c.- Initiate more actions (i.e. auto shut down servers, close down internet access, etc.) with IBM Security Access Manager (ISAM) & IBM Watson.

 

A contribution against cybercrime attacks indicated in The 2016 Internet Organised Crime Threat Assessment (IOCTA)

https://www.europol.europa.eu/content/internet-organised-crime-threat-assessment-iocta-2016

 

Technologies Used

Technical Skills Used

  • Cognitive Computing
  • Quantum Computing

Interesting Documents

  • Miami25.7743-80.1937
  • New York City (NY-US)40.7143-74.006
  • Tallinn (EE)59.43724.7535
  • Berlin (DE)52.524413.4105
Ask me a question
Sign Up with Email