Skip to content

Latest commit

 

History

History
329 lines (121 loc) · 3.04 KB

报告1:杜跃进---NewStage-从RSA2014看信息安全新时代.pdf.md

File metadata and controls

329 lines (121 loc) · 3.04 KB

New Stage RSA2014

RSA2014

RSA 2014

12 300 350 25000

1995RSA

""

Cher Ami

Trithemius Polygraphia

/

/

--

--

/

alice&bob

2014 : Hadoop

1674

     Gottfried Wilhelm Leibniz 

1882

DavidHilbert IT

1936

AlonzoChurch Hilbert

1958

   JohnMcCarthy LISP 

2004

Jeffery DeanSanjay Ghemawat LISP

MapReduce

2006

Doug CuttingMike Cafarella LuceneMapReduce Hadoop

""

PPTwww.1ppt.com/moban/ www.1ppt.com/hangye/ PPTwww.1ppt.com/jieri/ www.1ppt.com/sucai/ PPTwww.1ppt.com/beijing/ www.1ppt.com/tubiao/ PPT w ww.1ppt.com/xiazai/ www.1ppt.com/powerpoint/ Word www.1ppt.com/word/ www.1ppt.com/excel/ www.1ppt.com/ziliao/ www.1ppt.com/kejian/ www.1ppt.com/fanwen/ www.1ppt.com/shiti/ www.1ppt.com/jiaoan/

PPT PPT PPT PPT Excel PPT

NSARSA NSA NSARSA 1000 "" RSABsafe Dual Elliptic CurveNSA RSA2004 NSARSA ""

TrustyConRSA" "RSAMoscone CenterTrustyCon AMC Metreon 2013RSANSA" " ---- TrustyCon TrustyCon

Nawaf Bitar

Scott Charney

/ Juniper

James Comey

Philippe Courtot

FBI

QualysCEO

Coviello EMC RSA

Nawaf Bitar

Scott Charney

Michael Fey McAfee

Whitfield Diffie SafeLogic

Stephen Colbert Art Gilliland

James Comey

HP

Philippe Courtot

Paul Kocher

Cryptography Research, Inc.

Coviello

Whitfield Diffie

Ronald Rivest RSAMIT

Stephen Trilling SymaPnautleKcocher Kevin Mandia

Kevin Mandia

FireEyeCOO

Michael Fey

Scott Harrison

Adi Shamir RSA

Art Gilliland

Ronald Rivest

Hugh Thompson

Adi Shamir

Padmasree Warrior

Cisco

Christopher Young Cisco

Stephen Trilling

Padmasree Warrior

Christopher Young

Taylor Wilson

Brian LaMacchia

""

  • APT1

Intelligence Driven

NSA and Trust What is going on at NSA these days The boundary between privacy and security: the NSA PRISM program NSA Surveillance: What We Know, and What to Do about It Updating the Law on Government Access to Your Online Data Social Media Single Sign-On: Could You Be Sharing More than Your Password? Leading Cybersecurity: Technically Sexy, Programmatically Dowdy Is the Security Industry Ready for SSL Decryption? Hardware Trojans and Malicious Logic Hot Topics in Privacy Entropy, Random Numbers And Keys: What's Good Enough? Economic Impact of PRISM on Cloud Services & Safe Harbor Beyond Information Warfare: The History of the Future of Security How to become a successful bitcoin thief Your Product is made WHERE? (Intel )

RSA2014


Big Player

: 2012/3/20, 6:46

APT 22001121510

2011

""

Out of Radar

""

2011

""

""

· · · · ·

·
·
·

HOW "Big Picture Thinking"

DHS Cybersecurity Future Technology: Where We Go From Here By Brendan Goode Director, Network Security Deployment Department of Homeland Security

Intelligence Driven/Knowledge Based Security ""

""

""

""""

VS

·
·
·

· ·

RSA 2014 NSA WSIS/IGF/ICANN

New Stage

-""