




版權(quán)說(shuō)明:本文檔由用戶(hù)提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
LLM&GenAlThreatIntelligenceInitiative
|GuideforPreparingandRespondingtoDeepfakeEvents
RevisionHistory
Revision
Date
Authors
Description
.01
June28,2024
RachelJames
BryanNakayama
FirstDraft
.03
July9th,2024
RachelJames
BryanNakayamaSarahThorton
RameshKumarVaibhavMalik
FeedbackandSecondDraft
.05
August6th,2024
RachelJames
BryanNakayamaSarahThorton
RameshKumar
VaibhavMalik
ManuelVillanueva
FourthDraft
1
September10,2024
RachelJames
BryanNakayama
Published
Theinformationprovidedinthisdocumentdoesnot,andisnotintendedto,constitutelegaladvice.Allinformationisforgeneralinformationalpurposesonly.Thisdocumentcontainslinkstoother
third-partywebsites.SuchlinksareonlyforconvenienceandOWASPdoesnotrecommendorendorsethecontentsofthethird-partysites.
Version:1Page2of35
|GuideforPreparingandRespondingtoDeepfakeEvents
LicenseandUsage
ThisdocumentislicensedunderCreativeCommons,CCBY-SA4.0Youarefreeto:
●Share—copyandredistributethematerialinanymediumorformat
●Adapt—remix,transform,andbuilduponthematerialforanypurpose,evencommercially.
Underthefollowingterms:
●Attribution—Youmustgiveappropriatecredit,providealinktothelicense,andindicateifchangesweremade.Youmaydosoinanyreasonablemanner,butnotinanywaythatsuggeststhelicensorendorsesyouoryouruse.
○AttributionGuidelines-mustincludetheprojectnameaswellasthenameoftheassetreferenced
■OWASPTop10forLLM-GuideforPreparingandRespondingtoDeepfakeEvents
●ShareAlike—Ifyouremix,transform,orbuilduponthematerial,youmustdistributeyourcontributionsunderthesamelicenseastheoriginal.
Linktofulllicensetext:/licenses/by-sa/4.0/legalcode
Version:1Page3of35
|GuideforPreparingandRespondingtoDeepfakeEvents
Contents
NotefromOWASPCTILayerLeadAuthors 5
Overview 6
Scope 7
Preparation 8
Riskassessment 8
ThreatActors 8
ThreatActivity 9
AssessmentofDefenses 9
Human-BasedAuthenticationBestPractices 10
FinancialTransactions 10
Helpdesk 11
Hiring 11
SensitiveDataDisclosure 11
BrandMonitoring 12
EventResponse 12
DeepFakeIncidentResponsePlan 12
AwarenessTraining 14
EventSpecificGuidance 16
Financialgainthroughfraudbyimpersonation 16
DetectionandAnalysis: 16
CommonTTPs: 16
Containment,EradicationandRecovery: 18
Post-IncidentActivity: 19
Impersonationforcyberattacks 20
DetectionandAnalysis: 20
CommonTTPs: 20
Containment,EradicationandRecovery: 22
Post-IncidentActivity: 23
JobInterviewFraud 24
DetectionandAnalysis: 24
CommonTTPs: 26
Containment,EradicationandRecovery: 27
Post-IncidentActivity: 27
Mis/Dis/MalInformation 28
DetectionandAnalysis 28
CommonTTPs: 29
Version:1Page4of35
|GuideforPreparingandRespondingtoDeepfakeEvents
Containment,EradicationandRecovery: 30
Post-IncidentActivity: 31
Conclusion 32
References 33
Version:1Page5of35
|GuideforPreparingandRespondingtoDeepfakeEvents
NotefromOWASPCTILayerLeadAuthors
Earlyin2024,theOWASPTop10forLLM&GenAIcommunityexpresseda
greatdealofinterestincoveringtheadversarialuseofarti?cial
intelligence.Onre?ection,thecoreteamdeterminedthatsince
vulnerabilitieswithinAIsystemswastheprimaryfocusoftheTop10,guidanceonadversarialusefelloutsidethescopeofthatpublication.TheOWASPcommunitycametogetherandvolunteeredtocreatea
separateresourcegroup,onethatwouldfocusoncreatingactionableguidance,checklistsandresearchintoadversarial
useforcybersecurityprofessionals.Thatgroup
becameknownastheCTILayerteam,ledbyRachelJamesandBryanNakayama.
ThisGuideforPreparingandRespondingtoDeepfakeEventsisthe?rstofseveralplannedpublicationsoftheCTILayer.Thispublicationwasdevelopedby
cybersecurityprofessionalsforcybersecurityprofessionals.Weintendedto
providepracticalguidanceforatechnicalandleadershipaudiencewhomust
createplaybooks,responseplansandquicklyrespondtoadeepfakeevent.Itisthehopeoftheauthorsandcontributorsofthisdocumentthatwecanimprovethecultivationofbestpracticesandprovideacomprehensiveoverviewofwhatisinvolvedinpreparing,detecting,andrespondingtosuchevents.
RachelJames,CISSP,CISA,OSCP,GMLE
CyberShujinLLC
racheljames@
BryanNakayama,Ph.D.
CTIProfessional
bryan.nakayama@
Version:1Page6of35
|GuideforPreparingandRespondingtoDeepfakeEvents
Overview
Deepfakes—hyper-realisticdigitalforgeries—havegainedsigni?cantattentionastherapid
developmentofgenerativeAIhasmadeiteasiertoproduceconvincinglyrealisticvideosandaudiorecordingsthatcandeceiveeventhemostdiscerningviewers.Theyposeapotentiallydaunting
challengeforcybersecurityprofessionalssincefraudstersandcybercriminalscanleverage
deepfakestocarryoutsophisticatedimpersonationandsocialengineeringattacks.Duetothe
widespreaduseofsocialmedia,everyonefromhigh-pro?leindividualslikeCEOstoaverage
citizensareattheriskofimpersonationsinceitcantakeaslittleas10secondsofaudioorvideotoproduceaconvincingdeepfake.Deepfake-generatedcontenthasalreadybeenusedinphishing
andfraudschemes,whereattackerscreatedvideosofCEOsandothertrusted?guresto
manipulateemployeesintodivulgingsensitiveinformationand/ortransferringfunds(Chen&Magramo,2024).
Whiledeepfakesareapowerfultoolforsocialengineering,cybersecurityprofessionalsdo
notneedtoturntonewdetectiontechnologiesorintensive“howtospotadeepfake”training
programsinordertomitigatetheriskthattheypose.Recentstudiessuggestthatdeepfake
detectiontechnologiesarestillimmatureandtherapidadvanceofthetechnologywillmake
trainingprogrammesfocusedonlookingforspeci?cvisualoraudioartifactsrapidlyout-of-date
(GAO,2024).Moreover,researchershavediscoveredthatevenwithtrainingpeoplebothcannot
reliablydetectdeepfakesandtendtooverestimatetheirownabilitytoidentifydeepfakes(K?bisetal.,2021).Likemanyothersocialengineeringattacks,deepfake-enhancedattacksfrequently
dependonthevictimbypassingestablishedproceduresandcontrolsatthebehestoftheattacker.Therefore,thisguideemphasizespracticalandpragmaticdefense-in-depthstrategiesaswellaslayeredcontrolsasakeyapproachthatcybersecurityprofessionalsshouldtaketodeepfakes.
Thehopeistoprovideaguidethatisresilienttoevolvingdeepfake-enhancedthreatsby
Focusingonprocessadherenceratherthanvisualorauditorydetectionoffakes.
applyingfundamentalsecurityprinciples.Keystrategiesthattheguideendorsesinclude:
●Implementingandmaintainingstrong?nancialcontrolsandveri?cationprocedures.
●Cultivatingacultureofawarenessandskepticismtowardsunusualrequests.
●Developingandregularlyupdatingincidentresponseplans.
The?rstsectionintheguideistheScopewhichoutlineskeyde?nitionsandtheintended
audience.Theguidedistinguishesbetweenfourdifferentscenariosbasedonattackerintentions—?nancialfraud,jobinterviewfraud,socialengineering,mis/dis/malinformation—andprovides
guidanceacrossthefourstagesofincidentresponsefromNISTSpecialPublication800-61Revision3:
1.Preparation,
2.DetectionandAnalysis,
3.Containment,EradicationandRecovery
4.Post-incidentactivity
Version:1Page7of35
|GuideforPreparingandRespondingtoDeepfakeEvents
Scope
Syntheticmediaintendedtoreproducesomeone’slikenessisgenerallydividedintotwo
Cheapfakes-Multimediathathasbeenmanipulatedusingtechniquesthatdonot
involvemachine/deeplearning,whichinmanycasescanstillbeaseffectiveasthemoretechnicallysophisticatedtechniques,areoftenreferredtoasshalloworcheapfakes.
●Deepfakes-Multimediathathaveeitherbeencreated(fullysynthetic)oredited
(partiallysynthetic)usingsomeformofmachine/deeplearning(arti?cialintelligence)arereferredtoasdeepfakes.
Wewillfocusthisguidanceonthreecategoriesofmaliciousdeepfakesbasedontheattacker’sobjective:
categories(DOD,2023):
1.Financialgainthroughfraudbyimpersonation
2.Jobinterviewfraud
3.Impersonationtofurthercyberattacks(suchasinitialaccess)
4.Mis/Dis/Malinformation
Mostorganizationsoutsidegovernmentandjournalisticentitieswillpotentiallybetargeted
foroneofthesethreeobjectives.Basedonpublicandprivateintelligencesources,webelievetherehasbeenaminorbutmeasurableincreaseinactivityfromthesethreecategoriesimpacting
organizationssincemid-2023.
Weseparatemaliciousdeepfakeactivityintothreecategoriesbecausethepreparationand
responseforeacharedifferent.Forexample,ifathreatactorattemptstouseadeepfakeforfraudortrickahelpdeskemployeeintogivingthemaccess,youareunlikelytobefortunateenoughto
haveanycapturedvideooraudiotoanalyze,norwillthecontentbehostedonaplatform.Inthe
caseofmis/dis/malinformation,therewilllikelybesomemediatoanalyzeandatake-downprocesstobeconducted.
Whilethisguideprovidespreparationguidancethatisencompassingofallthreecategoriesofdeepfakeevents,thesubsequentDetectionandAnalysis;Containment,Eradicationand
Recovery,andPost-IncidentActivityguidanceareevent-speci?c.
Version:1Page8of35
|GuideforPreparingandRespondingtoDeepfakeEvents
Preparation
Preparationfocusesonunderstandingthecurrentriskthroughanalysisofthreatactivityandcurrentdefensiveposture,establishingadeepfakeincidentresponseplan,and?nally,establishingadeepfakereportingprocessandemployeeeducation.
Riskassessment
Atthetimeofwriting(July2024),deepfakesarenottheleadingcauseoffraud,cyberthreatactivityorreputationaldamageformostorganizationsoutsideofjournalisticandgovernment
entities.Thatsaid,publicandprivatecyberthreatintelligencesourcesindicatethattheuseof
deepfakesandcheapfakesby?nanciallymotivatedthreatactorshasseenaminorincrease.Asthetechnologyprogresses,itwillbecomeeasierandcheapertocreateadeepfakethatisgoodenoughforbroadattacks(Ciancaglini&Sancho,2024).
Aspartofpreparationfordeepfakeevents,organizationsshouldevaluatetheirownindividualriskofbecomingatargetofdeepfakesbasedontheirbusiness,mediaandpoliticalexposure,
history,threatactoractivity,andsusceptibilitytofraud.
ThreatActors
AnexcellentadversariallandscapegraphicproducedbyDARPA(Brooksetal.,2022),shownbelow,providesanunderstandingoftheadversarialskilllevelandtheobserveduseofthese
technologies.Thiswillhelporganizationsbetterdeterminewhichcategoryofdeepfaketechnicalcapabilitytheywillmostlikelyencounter.
ThisresearchalsoreflectsfindingsintheworkproducedbyOnfidoincollaborationwithFIDOAlliance,inthe2024IdentityFraudReport.
Version:1Page9of35
|GuideforPreparingandRespondingtoDeepfakeEvents
Theuptickinbiometricfraudanduseofcheapfakesanddeepfakesasameanstobypass
authenticationandcommitfraudhashadaminorobservableuptick.Theauthorsconcludethatthistrendhasseenaslightincreaseandthatwecanexpectthatincreasetocontinue.Therefore,this
windowofopportunityforcybersecurityprofessionalstodevelopawareness,detection,response,andmitigationstrategiesisideal.
ThreatActivity
Current,knownthreatsthatthesetechnologiesposeinclude:
1.Evasionofauthentication-
HowIBrokeIntoaBankAccountWithanAI-Generated
Voice
2.Impersonation-
UnusualCEOFraudviaDeepfakeAudioStealsUS$243,000FromUK
Company
3.FinancialFraud-
Financeworkerpaysout$25millionaftervideocallwithdeepfake
‘chief?nancialo代cer’
4.Reputationaldamage-afakebutrealisticvideoofaCEOmakingunsavory
commentsorincorrectstatementscandamagebrandimageandleadtoloss
Beware
ofdeepfakeofCEOrecommendingstocks,saysIndia'sNationalStockExchange
and
faketwitteraccountscausinglossestocompanyEliLillyandLockheedMartin
RespondingtoMaliciousCorporateDeepfakes–DebevoiseDataBlog
5.Deepfakeemploymentinterviews-
CriminalsUseDeepfakeVideostoInterviewfor
RemoteWork
6.Misinformationleadingto?nancialimplications-Suchasimpactingstockprices:
S&PSheds$500BillionfromFakePentagonExplosion
AssessmentofDefenses
Yourassessmentshouldincludeareviewofpolicies,procedures,enforcementandauditingmethodsforfourmainareas:sensitivedatadisclosure,helpdesk,?nancialtransactionsandeventresponse.
Werecommendstartingwithareviewofthegovernanceandapprovalstructurestooverseesecuritymeasuresandpoliciesrelatedtosensitivedatadisclosure,mergersandacquisitions,legal,?nancialtransactions,andemployeeidenti?cationforpurposesofauthorizationoridenti?cation
(suchaswiththehelpdesk,HR,andphysicalsecurity).Akeypartofthisreviewshouldinclude
interviewingemployeesenactingtheseprocessesinordertounderstandwhetherandtowhat
extenttherearedeviationsfrompolicy.Startingwiththisreviewwillallowyoutobeabletonavigate
Version:1Page10of35
|GuideforPreparingandRespondingtoDeepfakeEvents
successfullythroughthegovernanceandapprovalstructurestosuggestchangesandposturehardeningprocesses.
Human-BasedAuthenticationBestPractices
Ideally,atleasttwoofthefollowingbestpracticeswherehuman-basedauthenticationispermittedshouldbeinuse.Thesebestpracticesinclude:
●Maintainanemployeedirectoryofapprovedcommunicationmethodsthatcanactasadditionalveri?cationtoauthenticateausersuchascorporateinstantmessenger,additionalphonenumber,alternativeemailsoraliasesthatcanbeusedtocon?rmavoicerequest.
●AlternativeCommunicationVeri?cation:callingthepersonbackonapre-registeredphonenumbertocon?rmtheidentityandrequest.
●CodeoftheDay-inthispractice,oftenimplementedin?nancialinstitutions,
requiresthecallerorrequestertorefertoasecuresystemwhichgeneratesa
randomuniquecodethatrotatesonafrequentbasis.Despiteitsname,theCodeoftheDaytypicallyrotatesseveraltimesadayandisusedinconjunctionwithother
formsofverbalidenti?cation.Someorganizationsuseasecureapplicationthat
requiresMFAtoaccessthecurrentcode,whileothersdistributethecodethroughSMS.Usersmusthavetheabilitytorequestarotationofthecodeortoreporta
suspectedcompromiseofthecode,toallowforrotation-on-demandinadditiontofrequentautomaticrotations.Insituationswhereanemployeeisunableto
authenticatetotheapplicationordevicetogetthecode,itispermissiblefora
managerorcoworkertosharethecodeonlyinpersonandaftercon?rmingavalidemployeebadge(byswipingintoasecurearea).
●CustomSecurityQuestions:establishedwhenonboarding,orcreatedfor
third-partiesandkeptinencryptedstorage.Theseshouldnotbeanydatathatisabletobederivedfromacreditreport,socialmediaaccount,orthattheemployeeuses
routinely(dateofbirth,employeeID,employeeloginname,shouldnotbeused).
Disallowcommonquestionssuchas“Mother’sMaidenname”or“Pet’s?rstname.”
●Requirethecaller’smanagerorsupervisortoverifytherequestbysendinganemail,orconductinganoutboundcalltothemanageronapre-registeredphonenumber.
FinancialTransactions
Ensurethefollowingbestpracticesfor?nancialtransactionsarecontainedinwrittenpolicy
Clearwrittenpoliciesregarding?nancialtransactionsandcontrols.
andproceure,andhavemeansofenforcementandauditingforfailures:
●SoD(SeparationofDuties):Separatecriticalfunctionssothatnosingleindividual
hascontroloverallaspectsofany?nancialtransaction.Forexample,thepersonwhoauthorizesapaymentshoulddifferfromthepersonwhoprocessesit,andboth
shouldhaveindependentnon-overlappingdecision-making/justi?cationchainstodotheirpartsrespectively.
●DualAuthorization:Requiretwoauthorizedindividualstoapprovesigni?canttransactions.Thisensuresthateverypersoncanonlyinitiateandcompleteatransactionwithoversight.
●Considera“codeoftheday”techniquethatmustbestatedforanyauthorizationoftransactionsorsharingofsensitiveinformation.Accessingtheday'scoderequiresbothpartiestoaccessaportaldisplayingthecode.
●MFAonallsystemsforcommunicationand?nancialtransactionprocessing.
●IdentifyprocessesthatpermitauthorizationandauthenticationthroughmeansthatarenotprotectedbyMFA.
●Inventorythemethodofhuman-basedauthentication,andreviewforbestpractices.
●Dual-bandcommunicationveri?cationrequirestwotypesofauthenticationthatcannotcomethroughasinglecommunicationchannel.Forexample,Transactions
Version:1Page11of35
|GuideforPreparingandRespondingtoDeepfakeEvents
shouldnotbeabletoberequested,reviewed,orapprovedsolelythroughemailorphonecalls.
●Regularauditsandperiodicaccessreviewstoensuretheabove.
●Ensurecomplianceproceduresfor?nancialtransactionsprovidesigni?cantlatitudetochallengeseniorleadershiprequests.
●Requiremultipleapprovalsfortransactionsaboveacertainthreshold.
Helpdesk
●Reviewcurrentpolicyandproceduresforpasswordreset,newdeviceenrollmentintoMFA,andreportingforrepeatedfailedverbalauthenticationattempts.
●Interviewemployeesinthosedepartmentstodeterminecurrentwork?ow(whichmaybedifferentthandocumentedpolicyorprocess).
●Testprocess(afterobtainingpermissiontodoso).
●Identifygapsinpolicy,procedureandactualpractice.
●IdentifyprocessesthatpermitauthorizationandauthenticationthroughmeansthatarenotprotectedbyMFA.
●Inventorythemethodofhuman-basedauthentication,reviewforbestpractices.
Hiring
●Ensurethereisanestablishedprocessforreportingsuspicionofcandidateimpersonationorfraud,andthatallrecruitersandhiringmanagersreceiveawarenesstrainingaboutthetrendsandthereportingprocess.
●Reviewidenti?cationveri?cationprocessesfornewemployees.Ensurethereisenhancedveri?cationofIDsforallapplicantstodetectforgedidentities.
Considerusingidenti?cationserviceswhichareFIDOAlliancecerti?edforbestpractices:
o
GetCerti?edforFaceVeri?cation|FIDOAlliance-FIDOAlliance
o
IdentityVeri?cationCerti?cationPrograms|FIDO-FIDOAlliance
o
BattlingDeepfakeswithCerti?edIdentityVeri?cation|FIDOAlliance-FIDO
Alliance
●Includelanguageinjobpostingsstatingthatreasonableinterviewaccommodationswillbeprovideduponrequestbuttheexpectationisnoaudioorvideomanipulationmethodswillbeallowedduringtheinterviewprocess.
●Educatecandidatesthatareinvitedtointerviewthatyouhaveprocessesfor
identifyingcandidateimpersonators.Also,letthemknowthatyouwillprosecutealldiscoveredemploymentfraud.(Sullivan,2020)
●Implementaseriesofinterviewswithdifferentteammembersandwherepossiblevarytheformat(video,phone,in-person)andtimingofinterviews.
●Whenacandidateisselectedforaninterview,ensuretheprocessforschedulingthatinterviewincludesadisclosurethattheinterviewmustbeconductedwiththe
cameraon,nobackgroundblurringorbackdrops,noaudioorvideomanipulationor?ltering,noheadphones,withtheirscreenshared.Stateagainthatrequestsfor
reasonableaccommodationsforassistivetechnologymaybemadeatthispoint.
●Auditallofyourhiringpracticestoensureyourhiringteamisconsistentlyfollowingbestpracticesonbackgroundchecks,references,resumereview,interviews,andmore.
SensitiveDataDisclosure
●Reviewcurrentpolicyandproceduresforsensitivedatadisclosurewhichmayincludemergersandacquisitions,legal,?nancialtransactions,andemployeeinformation(HR)disclosures.
●Interviewemployeesinthosedepartmentstodeterminethecurrentwork?ow(whichmaybedifferentthandocumentedpolicyorprocess).
Version:1Page12of35
|GuideforPreparingandRespondingtoDeepfakeEvents
●Identifygapsinpolicy,procedureandactualpractice.
●IdentifyprocessesthatpermitauthorizationandauthenticationthroughmeansthatarenotprotectedbyMFA.
●Inventorythemethodofhuman-basedauthentication,andreviewforbestpractices.
●Scheduleareviewoftheseproceduresonatleastanannualbasis,asbestpracticesoftenchangeaccordingtocurrentthreatlandscape.
BrandMonitoring
●Completeaninventoryofallthedepartments,toolsandservicesleveragedbythe
organizationforbrandandreputationmonitoring.Oftenthismonitoringisconductedbymultipleteams(CTI,legalbrandprotection,etc).
●Reviewmonitoringservicesandplatformstodetermineifdeepfakealertingiswithinscope.
●Ensurethosedepartmentsareeducatedandtrainedontheprocedureforreportingdeepfakes.
EventResponse
●Identifycurrentmechanismsforreportingdeepfakes,anycurrentguidanceorawarenessfordeepfakes.
●Reviewforensicretainerstodetermineifdigitalforensicsexpertisefordeepfakeanalysisisincluded,andwhattheservicelevelagreement(SLA)forthatanalysisis.
●Determinewhatserviceormechanismyourorganizationusesfortakedownrequestsforlook-alikedomainsandothercopyrightviolationsanddetermineifthatserviceorprocessisalsoequippedtohandletakedownrequestsfordeepfakecontent(Gesseretal.,2023).
●Revieworestablishadeepfakeincidentresponseplan.
DeepFakeIncidentResponsePlan
Nowthatyouhavedonethecriticalhomeworkinyourriskassessmentphaseandunderstandthreats,threatactivity,andprocessesrelevanttoyourspeci?corganization,youcandevelopa
deepfakeincidentresponseplan.Adeepfakeincidentresponseplaniscriticalasduringanevent,havingclearlyoutlinedrolesandresponsibilities,templatesforcommunication,andan
understandingofhowtorespondiscrucialtoatimelyresponse.Aquickresponsehelpsan
Mitigateorreducereputationaldamage
organization:
●Protectsensitiveinformation
●Preservetrustandcredibility
●Ensure?nancialimpactsarelimited
●Adheretolegalandregulatorycompliancerequirements
●Ensureoperationalcontinuity
●IdentifyopportunitiesformitigationandensurestrategyandprocessesareinplaceAhelpfuldiagramforstartingthisplanningisprovidedinadocumentfromtheDepartmentof
HomelandSecuritycalled“IncreasingThreatofDeepFakeIdentities.”theopportunitiesfor
Version:1Page13of35
|GuideforPreparingandRespondingtoDeepfakeEvents
mitigationidenti?ed:
Establishgovernancestructurestooverseesecuritymeasuresandpoliciesrelated
Thedeepfakeincidentresponseplanningprocessshould,ataminimum(Gesseretal.,2022):todeepfakethreats.
●Documentwhoownsmonitoringfordeepfakes,whatisthealertingprocess,channels,andstakeholders.
●Documentwhoownsthetakedownprocessfordeepfakes,andhowescalationisconducted,suchaslegalactionifatakedownrequestisdenied.
●Createacrisiscommunicationplanforeachtypeofthedeepfakescenariosdescribedbelow.Inallscenarios,quickandeffectivecommunicationiskeytocontainmentinresponse.
○Ensurethattemplatesaredevelopedandapprovedbyallpartieswithwell-de?nedapprovalprocessesforwhentoimplementthem.
○Ensuredistributionplansandtemplatesareupdatedregularly.
●Organizationsshouldconsiderwhetherthedeepfakesarepartofalargercampaignintendedtoharass,exactrevenge,orextortacompanyorindividuals.Incident
responseplansshouldaccountforthefollowingimplications(Gesseretal.,2023):
○Reputationaldamage.
○Extortionpressurefollowingaransomwareordataex?ltrationevent.
○Hacktivism/corporateactivism.
○Financialfraud.
Version:1Page14of35
|GuideforPreparingandRespondingtoDeepfakeEvents
○Sensitiveinformationdisclosure.
○Industrialespionage.
○Computerornetworkbreaches.
○Misleadingstakeho
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶(hù)所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶(hù)上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶(hù)上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶(hù)因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 學(xué)校電采暖管理制度
- 學(xué)校營(yíng)養(yǎng)辦管理制度
- 學(xué)生作業(yè)量管理制度
- 學(xué)生防欺凌管理制度
- 安全勸導(dǎo)員管理制度
- 安全科文件管理制度
- 宋太祖地方管理制度
- 寶安托育園管理制度
- 實(shí)訓(xùn)室物品管理制度
- 客戶(hù)qq群管理制度
- 禮讓行車(chē)培訓(xùn)
- 《精餾塔工作原理》課件
- 基于學(xué)科核心素養(yǎng)的初中歷史大單元教學(xué)設(shè)計(jì)研究
- 北師大版二年級(jí)下冊(cè)數(shù)學(xué)計(jì)算題每日一練帶答案(共20天)
- 北師大版四年級(jí)下冊(cè)數(shù)學(xué)計(jì)算題每日一練帶答案(共30天)
- 中醫(yī)診所信息安全管理制度
- 應(yīng)急管理部門(mén)職工招聘合同
- 2025年教師招聘教師資格面試逐字稿初中體育教師招聘面試《排球正面雙手墊球》試講稿(逐字稿)
- 公共危機(jī)管理(本)-第五次形成性考核-國(guó)開(kāi)(BJ)-參考資料
- 基于SLM工藝的點(diǎn)陣結(jié)構(gòu)優(yōu)化設(shè)計(jì)的工藝要素研究
- 太陽(yáng)能路燈施工方案
評(píng)論
0/150
提交評(píng)論