




版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
LLM&GenAlThreatIntelligenceInitiative
|GuideforPreparingandRespondingtoDeepfakeEvents
RevisionHistory
Revision
Date
Authors
Description
.01
June28,2024
RachelJames
BryanNakayama
FirstDraft
.03
July9th,2024
RachelJames
BryanNakayamaSarahThorton
RameshKumarVaibhavMalik
FeedbackandSecondDraft
.05
August6th,2024
RachelJames
BryanNakayamaSarahThorton
RameshKumar
VaibhavMalik
ManuelVillanueva
FourthDraft
1
September10,2024
RachelJames
BryanNakayama
Published
Theinformationprovidedinthisdocumentdoesnot,andisnotintendedto,constitutelegaladvice.Allinformationisforgeneralinformationalpurposesonly.Thisdocumentcontainslinkstoother
third-partywebsites.SuchlinksareonlyforconvenienceandOWASPdoesnotrecommendorendorsethecontentsofthethird-partysites.
Version:1Page2of35
|GuideforPreparingandRespondingtoDeepfakeEvents
LicenseandUsage
ThisdocumentislicensedunderCreativeCommons,CCBY-SA4.0Youarefreeto:
●Share—copyandredistributethematerialinanymediumorformat
●Adapt—remix,transform,andbuilduponthematerialforanypurpose,evencommercially.
Underthefollowingterms:
●Attribution—Youmustgiveappropriatecredit,providealinktothelicense,andindicateifchangesweremade.Youmaydosoinanyreasonablemanner,butnotinanywaythatsuggeststhelicensorendorsesyouoryouruse.
○AttributionGuidelines-mustincludetheprojectnameaswellasthenameoftheassetreferenced
■OWASPTop10forLLM-GuideforPreparingandRespondingtoDeepfakeEvents
●ShareAlike—Ifyouremix,transform,orbuilduponthematerial,youmustdistributeyourcontributionsunderthesamelicenseastheoriginal.
Linktofulllicensetext:/licenses/by-sa/4.0/legalcode
Version:1Page3of35
|GuideforPreparingandRespondingtoDeepfakeEvents
Contents
NotefromOWASPCTILayerLeadAuthors 5
Overview 6
Scope 7
Preparation 8
Riskassessment 8
ThreatActors 8
ThreatActivity 9
AssessmentofDefenses 9
Human-BasedAuthenticationBestPractices 10
FinancialTransactions 10
Helpdesk 11
Hiring 11
SensitiveDataDisclosure 11
BrandMonitoring 12
EventResponse 12
DeepFakeIncidentResponsePlan 12
AwarenessTraining 14
EventSpecificGuidance 16
Financialgainthroughfraudbyimpersonation 16
DetectionandAnalysis: 16
CommonTTPs: 16
Containment,EradicationandRecovery: 18
Post-IncidentActivity: 19
Impersonationforcyberattacks 20
DetectionandAnalysis: 20
CommonTTPs: 20
Containment,EradicationandRecovery: 22
Post-IncidentActivity: 23
JobInterviewFraud 24
DetectionandAnalysis: 24
CommonTTPs: 26
Containment,EradicationandRecovery: 27
Post-IncidentActivity: 27
Mis/Dis/MalInformation 28
DetectionandAnalysis 28
CommonTTPs: 29
Version:1Page4of35
|GuideforPreparingandRespondingtoDeepfakeEvents
Containment,EradicationandRecovery: 30
Post-IncidentActivity: 31
Conclusion 32
References 33
Version:1Page5of35
|GuideforPreparingandRespondingtoDeepfakeEvents
NotefromOWASPCTILayerLeadAuthors
Earlyin2024,theOWASPTop10forLLM&GenAIcommunityexpresseda
greatdealofinterestincoveringtheadversarialuseofarti?cial
intelligence.Onre?ection,thecoreteamdeterminedthatsince
vulnerabilitieswithinAIsystemswastheprimaryfocusoftheTop10,guidanceonadversarialusefelloutsidethescopeofthatpublication.TheOWASPcommunitycametogetherandvolunteeredtocreatea
separateresourcegroup,onethatwouldfocusoncreatingactionableguidance,checklistsandresearchintoadversarial
useforcybersecurityprofessionals.Thatgroup
becameknownastheCTILayerteam,ledbyRachelJamesandBryanNakayama.
ThisGuideforPreparingandRespondingtoDeepfakeEventsisthe?rstofseveralplannedpublicationsoftheCTILayer.Thispublicationwasdevelopedby
cybersecurityprofessionalsforcybersecurityprofessionals.Weintendedto
providepracticalguidanceforatechnicalandleadershipaudiencewhomust
createplaybooks,responseplansandquicklyrespondtoadeepfakeevent.Itisthehopeoftheauthorsandcontributorsofthisdocumentthatwecanimprovethecultivationofbestpracticesandprovideacomprehensiveoverviewofwhatisinvolvedinpreparing,detecting,andrespondingtosuchevents.
RachelJames,CISSP,CISA,OSCP,GMLE
CyberShujinLLC
racheljames@
BryanNakayama,Ph.D.
CTIProfessional
bryan.nakayama@
Version:1Page6of35
|GuideforPreparingandRespondingtoDeepfakeEvents
Overview
Deepfakes—hyper-realisticdigitalforgeries—havegainedsigni?cantattentionastherapid
developmentofgenerativeAIhasmadeiteasiertoproduceconvincinglyrealisticvideosandaudiorecordingsthatcandeceiveeventhemostdiscerningviewers.Theyposeapotentiallydaunting
challengeforcybersecurityprofessionalssincefraudstersandcybercriminalscanleverage
deepfakestocarryoutsophisticatedimpersonationandsocialengineeringattacks.Duetothe
widespreaduseofsocialmedia,everyonefromhigh-pro?leindividualslikeCEOstoaverage
citizensareattheriskofimpersonationsinceitcantakeaslittleas10secondsofaudioorvideotoproduceaconvincingdeepfake.Deepfake-generatedcontenthasalreadybeenusedinphishing
andfraudschemes,whereattackerscreatedvideosofCEOsandothertrusted?guresto
manipulateemployeesintodivulgingsensitiveinformationand/ortransferringfunds(Chen&Magramo,2024).
Whiledeepfakesareapowerfultoolforsocialengineering,cybersecurityprofessionalsdo
notneedtoturntonewdetectiontechnologiesorintensive“howtospotadeepfake”training
programsinordertomitigatetheriskthattheypose.Recentstudiessuggestthatdeepfake
detectiontechnologiesarestillimmatureandtherapidadvanceofthetechnologywillmake
trainingprogrammesfocusedonlookingforspeci?cvisualoraudioartifactsrapidlyout-of-date
(GAO,2024).Moreover,researchershavediscoveredthatevenwithtrainingpeoplebothcannot
reliablydetectdeepfakesandtendtooverestimatetheirownabilitytoidentifydeepfakes(K?bisetal.,2021).Likemanyothersocialengineeringattacks,deepfake-enhancedattacksfrequently
dependonthevictimbypassingestablishedproceduresandcontrolsatthebehestoftheattacker.Therefore,thisguideemphasizespracticalandpragmaticdefense-in-depthstrategiesaswellaslayeredcontrolsasakeyapproachthatcybersecurityprofessionalsshouldtaketodeepfakes.
Thehopeistoprovideaguidethatisresilienttoevolvingdeepfake-enhancedthreatsby
Focusingonprocessadherenceratherthanvisualorauditorydetectionoffakes.
applyingfundamentalsecurityprinciples.Keystrategiesthattheguideendorsesinclude:
●Implementingandmaintainingstrong?nancialcontrolsandveri?cationprocedures.
●Cultivatingacultureofawarenessandskepticismtowardsunusualrequests.
●Developingandregularlyupdatingincidentresponseplans.
The?rstsectionintheguideistheScopewhichoutlineskeyde?nitionsandtheintended
audience.Theguidedistinguishesbetweenfourdifferentscenariosbasedonattackerintentions—?nancialfraud,jobinterviewfraud,socialengineering,mis/dis/malinformation—andprovides
guidanceacrossthefourstagesofincidentresponsefromNISTSpecialPublication800-61Revision3:
1.Preparation,
2.DetectionandAnalysis,
3.Containment,EradicationandRecovery
4.Post-incidentactivity
Version:1Page7of35
|GuideforPreparingandRespondingtoDeepfakeEvents
Scope
Syntheticmediaintendedtoreproducesomeone’slikenessisgenerallydividedintotwo
Cheapfakes-Multimediathathasbeenmanipulatedusingtechniquesthatdonot
involvemachine/deeplearning,whichinmanycasescanstillbeaseffectiveasthemoretechnicallysophisticatedtechniques,areoftenreferredtoasshalloworcheapfakes.
●Deepfakes-Multimediathathaveeitherbeencreated(fullysynthetic)oredited
(partiallysynthetic)usingsomeformofmachine/deeplearning(arti?cialintelligence)arereferredtoasdeepfakes.
Wewillfocusthisguidanceonthreecategoriesofmaliciousdeepfakesbasedontheattacker’sobjective:
categories(DOD,2023):
1.Financialgainthroughfraudbyimpersonation
2.Jobinterviewfraud
3.Impersonationtofurthercyberattacks(suchasinitialaccess)
4.Mis/Dis/Malinformation
Mostorganizationsoutsidegovernmentandjournalisticentitieswillpotentiallybetargeted
foroneofthesethreeobjectives.Basedonpublicandprivateintelligencesources,webelievetherehasbeenaminorbutmeasurableincreaseinactivityfromthesethreecategoriesimpacting
organizationssincemid-2023.
Weseparatemaliciousdeepfakeactivityintothreecategoriesbecausethepreparationand
responseforeacharedifferent.Forexample,ifathreatactorattemptstouseadeepfakeforfraudortrickahelpdeskemployeeintogivingthemaccess,youareunlikelytobefortunateenoughto
haveanycapturedvideooraudiotoanalyze,norwillthecontentbehostedonaplatform.Inthe
caseofmis/dis/malinformation,therewilllikelybesomemediatoanalyzeandatake-downprocesstobeconducted.
Whilethisguideprovidespreparationguidancethatisencompassingofallthreecategoriesofdeepfakeevents,thesubsequentDetectionandAnalysis;Containment,Eradicationand
Recovery,andPost-IncidentActivityguidanceareevent-speci?c.
Version:1Page8of35
|GuideforPreparingandRespondingtoDeepfakeEvents
Preparation
Preparationfocusesonunderstandingthecurrentriskthroughanalysisofthreatactivityandcurrentdefensiveposture,establishingadeepfakeincidentresponseplan,and?nally,establishingadeepfakereportingprocessandemployeeeducation.
Riskassessment
Atthetimeofwriting(July2024),deepfakesarenottheleadingcauseoffraud,cyberthreatactivityorreputationaldamageformostorganizationsoutsideofjournalisticandgovernment
entities.Thatsaid,publicandprivatecyberthreatintelligencesourcesindicatethattheuseof
deepfakesandcheapfakesby?nanciallymotivatedthreatactorshasseenaminorincrease.Asthetechnologyprogresses,itwillbecomeeasierandcheapertocreateadeepfakethatisgoodenoughforbroadattacks(Ciancaglini&Sancho,2024).
Aspartofpreparationfordeepfakeevents,organizationsshouldevaluatetheirownindividualriskofbecomingatargetofdeepfakesbasedontheirbusiness,mediaandpoliticalexposure,
history,threatactoractivity,andsusceptibilitytofraud.
ThreatActors
AnexcellentadversariallandscapegraphicproducedbyDARPA(Brooksetal.,2022),shownbelow,providesanunderstandingoftheadversarialskilllevelandtheobserveduseofthese
technologies.Thiswillhelporganizationsbetterdeterminewhichcategoryofdeepfaketechnicalcapabilitytheywillmostlikelyencounter.
ThisresearchalsoreflectsfindingsintheworkproducedbyOnfidoincollaborationwithFIDOAlliance,inthe2024IdentityFraudReport.
Version:1Page9of35
|GuideforPreparingandRespondingtoDeepfakeEvents
Theuptickinbiometricfraudanduseofcheapfakesanddeepfakesasameanstobypass
authenticationandcommitfraudhashadaminorobservableuptick.Theauthorsconcludethatthistrendhasseenaslightincreaseandthatwecanexpectthatincreasetocontinue.Therefore,this
windowofopportunityforcybersecurityprofessionalstodevelopawareness,detection,response,andmitigationstrategiesisideal.
ThreatActivity
Current,knownthreatsthatthesetechnologiesposeinclude:
1.Evasionofauthentication-
HowIBrokeIntoaBankAccountWithanAI-Generated
Voice
2.Impersonation-
UnusualCEOFraudviaDeepfakeAudioStealsUS$243,000FromUK
Company
3.FinancialFraud-
Financeworkerpaysout$25millionaftervideocallwithdeepfake
‘chief?nancialo代cer’
4.Reputationaldamage-afakebutrealisticvideoofaCEOmakingunsavory
commentsorincorrectstatementscandamagebrandimageandleadtoloss
Beware
ofdeepfakeofCEOrecommendingstocks,saysIndia'sNationalStockExchange
and
faketwitteraccountscausinglossestocompanyEliLillyandLockheedMartin
RespondingtoMaliciousCorporateDeepfakes–DebevoiseDataBlog
5.Deepfakeemploymentinterviews-
CriminalsUseDeepfakeVideostoInterviewfor
RemoteWork
6.Misinformationleadingto?nancialimplications-Suchasimpactingstockprices:
S&PSheds$500BillionfromFakePentagonExplosion
AssessmentofDefenses
Yourassessmentshouldincludeareviewofpolicies,procedures,enforcementandauditingmethodsforfourmainareas:sensitivedatadisclosure,helpdesk,?nancialtransactionsandeventresponse.
Werecommendstartingwithareviewofthegovernanceandapprovalstructurestooverseesecuritymeasuresandpoliciesrelatedtosensitivedatadisclosure,mergersandacquisitions,legal,?nancialtransactions,andemployeeidenti?cationforpurposesofauthorizationoridenti?cation
(suchaswiththehelpdesk,HR,andphysicalsecurity).Akeypartofthisreviewshouldinclude
interviewingemployeesenactingtheseprocessesinordertounderstandwhetherandtowhat
extenttherearedeviationsfrompolicy.Startingwiththisreviewwillallowyoutobeabletonavigate
Version:1Page10of35
|GuideforPreparingandRespondingtoDeepfakeEvents
successfullythroughthegovernanceandapprovalstructurestosuggestchangesandposturehardeningprocesses.
Human-BasedAuthenticationBestPractices
Ideally,atleasttwoofthefollowingbestpracticeswherehuman-basedauthenticationispermittedshouldbeinuse.Thesebestpracticesinclude:
●Maintainanemployeedirectoryofapprovedcommunicationmethodsthatcanactasadditionalveri?cationtoauthenticateausersuchascorporateinstantmessenger,additionalphonenumber,alternativeemailsoraliasesthatcanbeusedtocon?rmavoicerequest.
●AlternativeCommunicationVeri?cation:callingthepersonbackonapre-registeredphonenumbertocon?rmtheidentityandrequest.
●CodeoftheDay-inthispractice,oftenimplementedin?nancialinstitutions,
requiresthecallerorrequestertorefertoasecuresystemwhichgeneratesa
randomuniquecodethatrotatesonafrequentbasis.Despiteitsname,theCodeoftheDaytypicallyrotatesseveraltimesadayandisusedinconjunctionwithother
formsofverbalidenti?cation.Someorganizationsuseasecureapplicationthat
requiresMFAtoaccessthecurrentcode,whileothersdistributethecodethroughSMS.Usersmusthavetheabilitytorequestarotationofthecodeortoreporta
suspectedcompromiseofthecode,toallowforrotation-on-demandinadditiontofrequentautomaticrotations.Insituationswhereanemployeeisunableto
authenticatetotheapplicationordevicetogetthecode,itispermissiblefora
managerorcoworkertosharethecodeonlyinpersonandaftercon?rmingavalidemployeebadge(byswipingintoasecurearea).
●CustomSecurityQuestions:establishedwhenonboarding,orcreatedfor
third-partiesandkeptinencryptedstorage.Theseshouldnotbeanydatathatisabletobederivedfromacreditreport,socialmediaaccount,orthattheemployeeuses
routinely(dateofbirth,employeeID,employeeloginname,shouldnotbeused).
Disallowcommonquestionssuchas“Mother’sMaidenname”or“Pet’s?rstname.”
●Requirethecaller’smanagerorsupervisortoverifytherequestbysendinganemail,orconductinganoutboundcalltothemanageronapre-registeredphonenumber.
FinancialTransactions
Ensurethefollowingbestpracticesfor?nancialtransactionsarecontainedinwrittenpolicy
Clearwrittenpoliciesregarding?nancialtransactionsandcontrols.
andproceure,andhavemeansofenforcementandauditingforfailures:
●SoD(SeparationofDuties):Separatecriticalfunctionssothatnosingleindividual
hascontroloverallaspectsofany?nancialtransaction.Forexample,thepersonwhoauthorizesapaymentshoulddifferfromthepersonwhoprocessesit,andboth
shouldhaveindependentnon-overlappingdecision-making/justi?cationchainstodotheirpartsrespectively.
●DualAuthorization:Requiretwoauthorizedindividualstoapprovesigni?canttransactions.Thisensuresthateverypersoncanonlyinitiateandcompleteatransactionwithoversight.
●Considera“codeoftheday”techniquethatmustbestatedforanyauthorizationoftransactionsorsharingofsensitiveinformation.Accessingtheday'scoderequiresbothpartiestoaccessaportaldisplayingthecode.
●MFAonallsystemsforcommunicationand?nancialtransactionprocessing.
●IdentifyprocessesthatpermitauthorizationandauthenticationthroughmeansthatarenotprotectedbyMFA.
●Inventorythemethodofhuman-basedauthentication,andreviewforbestpractices.
●Dual-bandcommunicationveri?cationrequirestwotypesofauthenticationthatcannotcomethroughasinglecommunicationchannel.Forexample,Transactions
Version:1Page11of35
|GuideforPreparingandRespondingtoDeepfakeEvents
shouldnotbeabletoberequested,reviewed,orapprovedsolelythroughemailorphonecalls.
●Regularauditsandperiodicaccessreviewstoensuretheabove.
●Ensurecomplianceproceduresfor?nancialtransactionsprovidesigni?cantlatitudetochallengeseniorleadershiprequests.
●Requiremultipleapprovalsfortransactionsaboveacertainthreshold.
Helpdesk
●Reviewcurrentpolicyandproceduresforpasswordreset,newdeviceenrollmentintoMFA,andreportingforrepeatedfailedverbalauthenticationattempts.
●Interviewemployeesinthosedepartmentstodeterminecurrentwork?ow(whichmaybedifferentthandocumentedpolicyorprocess).
●Testprocess(afterobtainingpermissiontodoso).
●Identifygapsinpolicy,procedureandactualpractice.
●IdentifyprocessesthatpermitauthorizationandauthenticationthroughmeansthatarenotprotectedbyMFA.
●Inventorythemethodofhuman-basedauthentication,reviewforbestpractices.
Hiring
●Ensurethereisanestablishedprocessforreportingsuspicionofcandidateimpersonationorfraud,andthatallrecruitersandhiringmanagersreceiveawarenesstrainingaboutthetrendsandthereportingprocess.
●Reviewidenti?cationveri?cationprocessesfornewemployees.Ensurethereisenhancedveri?cationofIDsforallapplicantstodetectforgedidentities.
Considerusingidenti?cationserviceswhichareFIDOAlliancecerti?edforbestpractices:
o
GetCerti?edforFaceVeri?cation|FIDOAlliance-FIDOAlliance
o
IdentityVeri?cationCerti?cationPrograms|FIDO-FIDOAlliance
o
BattlingDeepfakeswithCerti?edIdentityVeri?cation|FIDOAlliance-FIDO
Alliance
●Includelanguageinjobpostingsstatingthatreasonableinterviewaccommodationswillbeprovideduponrequestbuttheexpectationisnoaudioorvideomanipulationmethodswillbeallowedduringtheinterviewprocess.
●Educatecandidatesthatareinvitedtointerviewthatyouhaveprocessesfor
identifyingcandidateimpersonators.Also,letthemknowthatyouwillprosecutealldiscoveredemploymentfraud.(Sullivan,2020)
●Implementaseriesofinterviewswithdifferentteammembersandwherepossiblevarytheformat(video,phone,in-person)andtimingofinterviews.
●Whenacandidateisselectedforaninterview,ensuretheprocessforschedulingthatinterviewincludesadisclosurethattheinterviewmustbeconductedwiththe
cameraon,nobackgroundblurringorbackdrops,noaudioorvideomanipulationor?ltering,noheadphones,withtheirscreenshared.Stateagainthatrequestsfor
reasonableaccommodationsforassistivetechnologymaybemadeatthispoint.
●Auditallofyourhiringpracticestoensureyourhiringteamisconsistentlyfollowingbestpracticesonbackgroundchecks,references,resumereview,interviews,andmore.
SensitiveDataDisclosure
●Reviewcurrentpolicyandproceduresforsensitivedatadisclosurewhichmayincludemergersandacquisitions,legal,?nancialtransactions,andemployeeinformation(HR)disclosures.
●Interviewemployeesinthosedepartmentstodeterminethecurrentwork?ow(whichmaybedifferentthandocumentedpolicyorprocess).
Version:1Page12of35
|GuideforPreparingandRespondingtoDeepfakeEvents
●Identifygapsinpolicy,procedureandactualpractice.
●IdentifyprocessesthatpermitauthorizationandauthenticationthroughmeansthatarenotprotectedbyMFA.
●Inventorythemethodofhuman-basedauthentication,andreviewforbestpractices.
●Scheduleareviewoftheseproceduresonatleastanannualbasis,asbestpracticesoftenchangeaccordingtocurrentthreatlandscape.
BrandMonitoring
●Completeaninventoryofallthedepartments,toolsandservicesleveragedbythe
organizationforbrandandreputationmonitoring.Oftenthismonitoringisconductedbymultipleteams(CTI,legalbrandprotection,etc).
●Reviewmonitoringservicesandplatformstodetermineifdeepfakealertingiswithinscope.
●Ensurethosedepartmentsareeducatedandtrainedontheprocedureforreportingdeepfakes.
EventResponse
●Identifycurrentmechanismsforreportingdeepfakes,anycurrentguidanceorawarenessfordeepfakes.
●Reviewforensicretainerstodetermineifdigitalforensicsexpertisefordeepfakeanalysisisincluded,andwhattheservicelevelagreement(SLA)forthatanalysisis.
●Determinewhatserviceormechanismyourorganizationusesfortakedownrequestsforlook-alikedomainsandothercopyrightviolationsanddetermineifthatserviceorprocessisalsoequippedtohandletakedownrequestsfordeepfakecontent(Gesseretal.,2023).
●Revieworestablishadeepfakeincidentresponseplan.
DeepFakeIncidentResponsePlan
Nowthatyouhavedonethecriticalhomeworkinyourriskassessmentphaseandunderstandthreats,threatactivity,andprocessesrelevanttoyourspeci?corganization,youcandevelopa
deepfakeincidentresponseplan.Adeepfakeincidentresponseplaniscriticalasduringanevent,havingclearlyoutlinedrolesandresponsibilities,templatesforcommunication,andan
understandingofhowtorespondiscrucialtoatimelyresponse.Aquickresponsehelpsan
Mitigateorreducereputationaldamage
organization:
●Protectsensitiveinformation
●Preservetrustandcredibility
●Ensure?nancialimpactsarelimited
●Adheretolegalandregulatorycompliancerequirements
●Ensureoperationalcontinuity
●IdentifyopportunitiesformitigationandensurestrategyandprocessesareinplaceAhelpfuldiagramforstartingthisplanningisprovidedinadocumentfromtheDepartmentof
HomelandSecuritycalled“IncreasingThreatofDeepFakeIdentities.”theopportunitiesfor
Version:1Page13of35
|GuideforPreparingandRespondingtoDeepfakeEvents
mitigationidenti?ed:
Establishgovernancestructurestooverseesecuritymeasuresandpoliciesrelated
Thedeepfakeincidentresponseplanningprocessshould,ataminimum(Gesseretal.,2022):todeepfakethreats.
●Documentwhoownsmonitoringfordeepfakes,whatisthealertingprocess,channels,andstakeholders.
●Documentwhoownsthetakedownprocessfordeepfakes,andhowescalationisconducted,suchaslegalactionifatakedownrequestisdenied.
●Createacrisiscommunicationplanforeachtypeofthedeepfakescenariosdescribedbelow.Inallscenarios,quickandeffectivecommunicationiskeytocontainmentinresponse.
○Ensurethattemplatesaredevelopedandapprovedbyallpartieswithwell-de?nedapprovalprocessesforwhentoimplementthem.
○Ensuredistributionplansandtemplatesareupdatedregularly.
●Organizationsshouldconsiderwhetherthedeepfakesarepartofalargercampaignintendedtoharass,exactrevenge,orextortacompanyorindividuals.Incident
responseplansshouldaccountforthefollowingimplications(Gesseretal.,2023):
○Reputationaldamage.
○Extortionpressurefollowingaransomwareordataex?ltrationevent.
○Hacktivism/corporateactivism.
○Financialfraud.
Version:1Page14of35
|GuideforPreparingandRespondingtoDeepfakeEvents
○Sensitiveinformationdisclosure.
○Industrialespionage.
○Computerornetworkbreaches.
○Misleadingstakeho
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 中職學(xué)生個(gè)人禮儀規(guī)范
- 安保服務(wù)補(bǔ)充合同協(xié)議
- 婚介定金合同協(xié)議
- 打造衛(wèi)生管理考試成功之路試題及答案
- 宣傳冊(cè)設(shè)計(jì)試題及答案
- 日照營(yíng)養(yǎng)師試題及答案
- 提升母豬護(hù)理的溝通能力技巧試題及答案
- 圖片眼力測(cè)試題及答案
- 2025年臨床執(zhí)業(yè)醫(yī)師考試科目介紹試題及答案
- 激光干涉測(cè)量技術(shù)的應(yīng)用場(chǎng)景試題及答案
- 新版食品安全法培訓(xùn)課件
- 2025年高考物理專項(xiàng)復(fù)習(xí):電磁感應(yīng)綜合題
- 第13課 亞非拉民族獨(dú)立運(yùn)動(dòng) 課件(共26張)2024-2025學(xué)年統(tǒng)編版高中歷史(必修)中外歷史綱要(下)
- 2020-2025年中國(guó)遼寧省風(fēng)力發(fā)電行業(yè)發(fā)展?jié)摿Ψ治黾巴顿Y方向研究報(bào)告
- 安全車輛測(cè)試題及答案
- 2025年貫徹中央八項(xiàng)規(guī)定精神及八項(xiàng)規(guī)定實(shí)施細(xì)則應(yīng)知應(yīng)會(huì)試題及答案
- (二模)咸陽(yáng)市2025年高考模擬檢測(cè)(二)語(yǔ)文試卷(含答案)
- 2025高校教資《高等教育法規(guī)》核心備考題庫(kù)(含典型題、重點(diǎn)題)
- sl582-2012水工金屬結(jié)構(gòu)制造安裝質(zhì)量檢驗(yàn)通則
- 行政事業(yè)單位財(cái)務(wù)知識(shí)培訓(xùn)
- 眼科中醫(yī)診療方案圓翳內(nèi)障
評(píng)論
0/150
提交評(píng)論