filmov
tv
Building Secure Systems using Security Chaos Engineering and Immunity - Yury Niño Roa
![preview_player](https://i.ytimg.com/vi/wxUHpKDal6Q/maxresdefault.jpg)
Показать описание
DERPCON 2020 Red Team
The metaphor of software viruses to biological ones is deeply ingrained. It is a fact that biological viruses are at least the namesake, the inspiration, for computer viruses.
Artificial immune systems are intelligent systems that recognize and learn from faults injected previously. Using computational techniques, these systems are able to use resilience patterns to build confidence in the system's capability to withstand turbulence. It is precisely one definition for chaos engineering which is considered as a set of practices to build immunity in software systems by injecting harm, like latency, CPU failure, or network black holes, to find and mitigate potential weaknesses.
In this talk, we are to discuss if it is possible to learn more about software failures leveraging concepts used in biological viruses, such as the raging COVID-19 epidemic. We are going to review the black swam theory and provide a list of attacks and tools that the attendants can use to mitigate security attacks.
The metaphor of software viruses to biological ones is deeply ingrained. It is a fact that biological viruses are at least the namesake, the inspiration, for computer viruses.
Artificial immune systems are intelligent systems that recognize and learn from faults injected previously. Using computational techniques, these systems are able to use resilience patterns to build confidence in the system's capability to withstand turbulence. It is precisely one definition for chaos engineering which is considered as a set of practices to build immunity in software systems by injecting harm, like latency, CPU failure, or network black holes, to find and mitigate potential weaknesses.
In this talk, we are to discuss if it is possible to learn more about software failures leveraging concepts used in biological viruses, such as the raging COVID-19 epidemic. We are going to review the black swam theory and provide a list of attacks and tools that the attendants can use to mitigate security attacks.