版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認(rèn)領(lǐng)
文檔簡介
LLM&GenAlThreatIntelligenceInitiative
|GuideforPreparingandRespondingtoDeepfakeEvents
RevisionHistory
Revision
Date
Authors
Description
.01
June28,2024
RachelJames
BryanNakayama
FirstDraft
.03
July9th,2024
RachelJames
BryanNakayamaSarahThorton
RameshKumarVaibhavMalik
FeedbackandSecondDraft
.05
August6th,2024
RachelJames
BryanNakayamaSarahThorton
RameshKumar
VaibhavMalik
ManuelVillanueva
FourthDraft
1
September10,2024
RachelJames
BryanNakayama
Published
Theinformationprovidedinthisdocumentdoesnot,andisnotintendedto,constitutelegaladvice.Allinformationisforgeneralinformationalpurposesonly.Thisdocumentcontainslinkstoother
third-partywebsites.SuchlinksareonlyforconvenienceandOWASPdoesnotrecommendorendorsethecontentsofthethird-partysites.
Version:1Page2of35
|GuideforPreparingandRespondingtoDeepfakeEvents
LicenseandUsage
ThisdocumentislicensedunderCreativeCommons,CCBY-SA4.0Youarefreeto:
●Share—copyandredistributethematerialinanymediumorformat
●Adapt—remix,transform,andbuilduponthematerialforanypurpose,evencommercially.
Underthefollowingterms:
●Attribution—Youmustgiveappropriatecredit,providealinktothelicense,andindicateifchangesweremade.Youmaydosoinanyreasonablemanner,butnotinanywaythatsuggeststhelicensorendorsesyouoryouruse.
○AttributionGuidelines-mustincludetheprojectnameaswellasthenameoftheassetreferenced
■OWASPTop10forLLM-GuideforPreparingandRespondingtoDeepfakeEvents
●ShareAlike—Ifyouremix,transform,orbuilduponthematerial,youmustdistributeyourcontributionsunderthesamelicenseastheoriginal.
Linktofulllicensetext:/licenses/by-sa/4.0/legalcode
Version:1Page3of35
|GuideforPreparingandRespondingtoDeepfakeEvents
Contents
NotefromOWASPCTILayerLeadAuthors 5
Overview 6
Scope 7
Preparation 8
Riskassessment 8
ThreatActors 8
ThreatActivity 9
AssessmentofDefenses 9
Human-BasedAuthenticationBestPractices 10
FinancialTransactions 10
Helpdesk 11
Hiring 11
SensitiveDataDisclosure 11
BrandMonitoring 12
EventResponse 12
DeepFakeIncidentResponsePlan 12
AwarenessTraining 14
EventSpecificGuidance 16
Financialgainthroughfraudbyimpersonation 16
DetectionandAnalysis: 16
CommonTTPs: 16
Containment,EradicationandRecovery: 18
Post-IncidentActivity: 19
Impersonationforcyberattacks 20
DetectionandAnalysis: 20
CommonTTPs: 20
Containment,EradicationandRecovery: 22
Post-IncidentActivity: 23
JobInterviewFraud 24
DetectionandAnalysis: 24
CommonTTPs: 26
Containment,EradicationandRecovery: 27
Post-IncidentActivity: 27
Mis/Dis/MalInformation 28
DetectionandAnalysis 28
CommonTTPs: 29
Version:1Page4of35
|GuideforPreparingandRespondingtoDeepfakeEvents
Containment,EradicationandRecovery: 30
Post-IncidentActivity: 31
Conclusion 32
References 33
Version:1Page5of35
|GuideforPreparingandRespondingtoDeepfakeEvents
NotefromOWASPCTILayerLeadAuthors
Earlyin2024,theOWASPTop10forLLM&GenAIcommunityexpresseda
greatdealofinterestincoveringtheadversarialuseofarti?cial
intelligence.Onre?ection,thecoreteamdeterminedthatsince
vulnerabilitieswithinAIsystemswastheprimaryfocusoftheTop10,guidanceonadversarialusefelloutsidethescopeofthatpublication.TheOWASPcommunitycametogetherandvolunteeredtocreatea
separateresourcegroup,onethatwouldfocusoncreatingactionableguidance,checklistsandresearchintoadversarial
useforcybersecurityprofessionals.Thatgroup
becameknownastheCTILayerteam,ledbyRachelJamesandBryanNakayama.
ThisGuideforPreparingandRespondingtoDeepfakeEventsisthe?rstofseveralplannedpublicationsoftheCTILayer.Thispublicationwasdevelopedby
cybersecurityprofessionalsforcybersecurityprofessionals.Weintendedto
providepracticalguidanceforatechnicalandleadershipaudiencewhomust
createplaybooks,responseplansandquicklyrespondtoadeepfakeevent.Itisthehopeoftheauthorsandcontributorsofthisdocumentthatwecanimprovethecultivationofbestpracticesandprovideacomprehensiveoverviewofwhatisinvolvedinpreparing,detecting,andrespondingtosuchevents.
RachelJames,CISSP,CISA,OSCP,GMLE
CyberShujinLLC
racheljames@
BryanNakayama,Ph.D.
CTIProfessional
bryan.nakayama@
Version:1Page6of35
|GuideforPreparingandRespondingtoDeepfakeEvents
Overview
Deepfakes—hyper-realisticdigitalforgeries—havegainedsigni?cantattentionastherapid
developmentofgenerativeAIhasmadeiteasiertoproduceconvincinglyrealisticvideosandaudiorecordingsthatcandeceiveeventhemostdiscerningviewers.Theyposeapotentiallydaunting
challengeforcybersecurityprofessionalssincefraudstersandcybercriminalscanleverage
deepfakestocarryoutsophisticatedimpersonationandsocialengineeringattacks.Duetothe
widespreaduseofsocialmedia,everyonefromhigh-pro?leindividualslikeCEOstoaverage
citizensareattheriskofimpersonationsinceitcantakeaslittleas10secondsofaudioorvideotoproduceaconvincingdeepfake.Deepfake-generatedcontenthasalreadybeenusedinphishing
andfraudschemes,whereattackerscreatedvideosofCEOsandothertrusted?guresto
manipulateemployeesintodivulgingsensitiveinformationand/ortransferringfunds(Chen&Magramo,2024).
Whiledeepfakesareapowerfultoolforsocialengineering,cybersecurityprofessionalsdo
notneedtoturntonewdetectiontechnologiesorintensive“howtospotadeepfake”training
programsinordertomitigatetheriskthattheypose.Recentstudiessuggestthatdeepfake
detectiontechnologiesarestillimmatureandtherapidadvanceofthetechnologywillmake
trainingprogrammesfocusedonlookingforspeci?cvisualoraudioartifactsrapidlyout-of-date
(GAO,2024).Moreover,researchershavediscoveredthatevenwithtrainingpeoplebothcannot
reliablydetectdeepfakesandtendtooverestimatetheirownabilitytoidentifydeepfakes(K?bisetal.,2021).Likemanyothersocialengineeringattacks,deepfake-enhancedattacksfrequently
dependonthevictimbypassingestablishedproceduresandcontrolsatthebehestoftheattacker.Therefore,thisguideemphasizespracticalandpragmaticdefense-in-depthstrategiesaswellaslayeredcontrolsasakeyapproachthatcybersecurityprofessionalsshouldtaketodeepfakes.
Thehopeistoprovideaguidethatisresilienttoevolvingdeepfake-enhancedthreatsby
Focusingonprocessadherenceratherthanvisualorauditorydetectionoffakes.
applyingfundamentalsecurityprinciples.Keystrategiesthattheguideendorsesinclude:
●Implementingandmaintainingstrong?nancialcontrolsandveri?cationprocedures.
●Cultivatingacultureofawarenessandskepticismtowardsunusualrequests.
●Developingandregularlyupdatingincidentresponseplans.
The?rstsectionintheguideistheScopewhichoutlineskeyde?nitionsandtheintended
audience.Theguidedistinguishesbetweenfourdifferentscenariosbasedonattackerintentions—?nancialfraud,jobinterviewfraud,socialengineering,mis/dis/malinformation—andprovides
guidanceacrossthefourstagesofincidentresponsefromNISTSpecialPublication800-61Revision3:
1.Preparation,
2.DetectionandAnalysis,
3.Containment,EradicationandRecovery
4.Post-incidentactivity
Version:1Page7of35
|GuideforPreparingandRespondingtoDeepfakeEvents
Scope
Syntheticmediaintendedtoreproducesomeone’slikenessisgenerallydividedintotwo
Cheapfakes-Multimediathathasbeenmanipulatedusingtechniquesthatdonot
involvemachine/deeplearning,whichinmanycasescanstillbeaseffectiveasthemoretechnicallysophisticatedtechniques,areoftenreferredtoasshalloworcheapfakes.
●Deepfakes-Multimediathathaveeitherbeencreated(fullysynthetic)oredited
(partiallysynthetic)usingsomeformofmachine/deeplearning(arti?cialintelligence)arereferredtoasdeepfakes.
Wewillfocusthisguidanceonthreecategoriesofmaliciousdeepfakesbasedontheattacker’sobjective:
categories(DOD,2023):
1.Financialgainthroughfraudbyimpersonation
2.Jobinterviewfraud
3.Impersonationtofurthercyberattacks(suchasinitialaccess)
4.Mis/Dis/Malinformation
Mostorganizationsoutsidegovernmentandjournalisticentitieswillpotentiallybetargeted
foroneofthesethreeobjectives.Basedonpublicandprivateintelligencesources,webelievetherehasbeenaminorbutmeasurableincreaseinactivityfromthesethreecategoriesimpacting
organizationssincemid-2023.
Weseparatemaliciousdeepfakeactivityintothreecategoriesbecausethepreparationand
responseforeacharedifferent.Forexample,ifathreatactorattemptstouseadeepfakeforfraudortrickahelpdeskemployeeintogivingthemaccess,youareunlikelytobefortunateenoughto
haveanycapturedvideooraudiotoanalyze,norwillthecontentbehostedonaplatform.Inthe
caseofmis/dis/malinformation,therewilllikelybesomemediatoanalyzeandatake-downprocesstobeconducted.
Whilethisguideprovidespreparationguidancethatisencompassingofallthreecategoriesofdeepfakeevents,thesubsequentDetectionandAnalysis;Containment,Eradicationand
Recovery,andPost-IncidentActivityguidanceareevent-speci?c.
Version:1Page8of35
|GuideforPreparingandRespondingtoDeepfakeEvents
Preparation
Preparationfocusesonunderstandingthecurrentriskthroughanalysisofthreatactivityandcurrentdefensiveposture,establishingadeepfakeincidentresponseplan,and?nally,establishingadeepfakereportingprocessandemployeeeducation.
Riskassessment
Atthetimeofwriting(July2024),deepfakesarenottheleadingcauseoffraud,cyberthreatactivityorreputationaldamageformostorganizationsoutsideofjournalisticandgovernment
entities.Thatsaid,publicandprivatecyberthreatintelligencesourcesindicatethattheuseof
deepfakesandcheapfakesby?nanciallymotivatedthreatactorshasseenaminorincrease.Asthetechnologyprogresses,itwillbecomeeasierandcheapertocreateadeepfakethatisgoodenoughforbroadattacks(Ciancaglini&Sancho,2024).
Aspartofpreparationfordeepfakeevents,organizationsshouldevaluatetheirownindividualriskofbecomingatargetofdeepfakesbasedontheirbusiness,mediaandpoliticalexposure,
history,threatactoractivity,andsusceptibilitytofraud.
ThreatActors
AnexcellentadversariallandscapegraphicproducedbyDARPA(Brooksetal.,2022),shownbelow,providesanunderstandingoftheadversarialskilllevelandtheobserveduseofthese
technologies.Thiswillhelporganizationsbetterdeterminewhichcategoryofdeepfaketechnicalcapabilitytheywillmostlikelyencounter.
ThisresearchalsoreflectsfindingsintheworkproducedbyOnfidoincollaborationwithFIDOAlliance,inthe2024IdentityFraudReport.
Version:1Page9of35
|GuideforPreparingandRespondingtoDeepfakeEvents
Theuptickinbiometricfraudanduseofcheapfakesanddeepfakesasameanstobypass
authenticationandcommitfraudhashadaminorobservableuptick.Theauthorsconcludethatthistrendhasseenaslightincreaseandthatwecanexpectthatincreasetocontinue.Therefore,this
windowofopportunityforcybersecurityprofessionalstodevelopawareness,detection,response,andmitigationstrategiesisideal.
ThreatActivity
Current,knownthreatsthatthesetechnologiesposeinclude:
1.Evasionofauthentication-
HowIBrokeIntoaBankAccountWithanAI-Generated
Voice
2.Impersonation-
UnusualCEOFraudviaDeepfakeAudioStealsUS$243,000FromUK
Company
3.FinancialFraud-
Financeworkerpaysout$25millionaftervideocallwithdeepfake
‘chief?nancialo代cer’
4.Reputationaldamage-afakebutrealisticvideoofaCEOmakingunsavory
commentsorincorrectstatementscandamagebrandimageandleadtoloss
Beware
ofdeepfakeofCEOrecommendingstocks,saysIndia'sNationalStockExchange
and
faketwitteraccountscausinglossestocompanyEliLillyandLockheedMartin
RespondingtoMaliciousCorporateDeepfakes–DebevoiseDataBlog
5.Deepfakeemploymentinterviews-
CriminalsUseDeepfakeVideostoInterviewfor
RemoteWork
6.Misinformationleadingto?nancialimplications-Suchasimpactingstockprices:
S&PSheds$500BillionfromFakePentagonExplosion
AssessmentofDefenses
Yourassessmentshouldincludeareviewofpolicies,procedures,enforcementandauditingmethodsforfourmainareas:sensitivedatadisclosure,helpdesk,?nancialtransactionsandeventresponse.
Werecommendstartingwithareviewofthegovernanceandapprovalstructurestooverseesecuritymeasuresandpoliciesrelatedtosensitivedatadisclosure,mergersandacquisitions,legal,?nancialtransactions,andemployeeidenti?cationforpurposesofauthorizationoridenti?cation
(suchaswiththehelpdesk,HR,andphysicalsecurity).Akeypartofthisreviewshouldinclude
interviewingemployeesenactingtheseprocessesinordertounderstandwhetherandtowhat
extenttherearedeviationsfrompolicy.Startingwiththisreviewwillallowyoutobeabletonavigate
Version:1Page10of35
|GuideforPreparingandRespondingtoDeepfakeEvents
successfullythroughthegovernanceandapprovalstructurestosuggestchangesandposturehardeningprocesses.
Human-BasedAuthenticationBestPractices
Ideally,atleasttwoofthefollowingbestpracticeswherehuman-basedauthenticationispermittedshouldbeinuse.Thesebestpracticesinclude:
●Maintainanemployeedirectoryofapprovedcommunicationmethodsthatcanactasadditionalveri?cationtoauthenticateausersuchascorporateinstantmessenger,additionalphonenumber,alternativeemailsoraliasesthatcanbeusedtocon?rmavoicerequest.
●AlternativeCommunicationVeri?cation:callingthepersonbackonapre-registeredphonenumbertocon?rmtheidentityandrequest.
●CodeoftheDay-inthispractice,oftenimplementedin?nancialinstitutions,
requiresthecallerorrequestertorefertoasecuresystemwhichgeneratesa
randomuniquecodethatrotatesonafrequentbasis.Despiteitsname,theCodeoftheDaytypicallyrotatesseveraltimesadayandisusedinconjunctionwithother
formsofverbalidenti?cation.Someorganizationsuseasecureapplicationthat
requiresMFAtoaccessthecurrentcode,whileothersdistributethecodethroughSMS.Usersmusthavetheabilitytorequestarotationofthecodeortoreporta
suspectedcompromiseofthecode,toallowforrotation-on-demandinadditiontofrequentautomaticrotations.Insituationswhereanemployeeisunableto
authenticatetotheapplicationordevicetogetthecode,itispermissiblefora
managerorcoworkertosharethecodeonlyinpersonandaftercon?rmingavalidemployeebadge(byswipingintoasecurearea).
●CustomSecurityQuestions:establishedwhenonboarding,orcreatedfor
third-partiesandkeptinencryptedstorage.Theseshouldnotbeanydatathatisabletobederivedfromacreditreport,socialmediaaccount,orthattheemployeeuses
routinely(dateofbirth,employeeID,employeeloginname,shouldnotbeused).
Disallowcommonquestionssuchas“Mother’sMaidenname”or“Pet’s?rstname.”
●Requirethecaller’smanagerorsupervisortoverifytherequestbysendinganemail,orconductinganoutboundcalltothemanageronapre-registeredphonenumber.
FinancialTransactions
Ensurethefollowingbestpracticesfor?nancialtransactionsarecontainedinwrittenpolicy
Clearwrittenpoliciesregarding?nancialtransactionsandcontrols.
andproceure,andhavemeansofenforcementandauditingforfailures:
●SoD(SeparationofDuties):Separatecriticalfunctionssothatnosingleindividual
hascontroloverallaspectsofany?nancialtransaction.Forexample,thepersonwhoauthorizesapaymentshoulddifferfromthepersonwhoprocessesit,andboth
shouldhaveindependentnon-overlappingdecision-making/justi?cationchainstodotheirpartsrespectively.
●DualAuthorization:Requiretwoauthorizedindividualstoapprovesigni?canttransactions.Thisensuresthateverypersoncanonlyinitiateandcompleteatransactionwithoversight.
●Considera“codeoftheday”techniquethatmustbestatedforanyauthorizationoftransactionsorsharingofsensitiveinformation.Accessingtheday'scoderequiresbothpartiestoaccessaportaldisplayingthecode.
●MFAonallsystemsforcommunicationand?nancialtransactionprocessing.
●IdentifyprocessesthatpermitauthorizationandauthenticationthroughmeansthatarenotprotectedbyMFA.
●Inventorythemethodofhuman-basedauthentication,andreviewforbestpractices.
●Dual-bandcommunicationveri?cationrequirestwotypesofauthenticationthatcannotcomethroughasinglecommunicationchannel.Forexample,Transactions
Version:1Page11of35
|GuideforPreparingandRespondingtoDeepfakeEvents
shouldnotbeabletoberequested,reviewed,orapprovedsolelythroughemailorphonecalls.
●Regularauditsandperiodicaccessreviewstoensuretheabove.
●Ensurecomplianceproceduresfor?nancialtransactionsprovidesigni?cantlatitudetochallengeseniorleadershiprequests.
●Requiremultipleapprovalsfortransactionsaboveacertainthreshold.
Helpdesk
●Reviewcurrentpolicyandproceduresforpasswordreset,newdeviceenrollmentintoMFA,andreportingforrepeatedfailedverbalauthenticationattempts.
●Interviewemployeesinthosedepartmentstodeterminecurrentwork?ow(whichmaybedifferentthandocumentedpolicyorprocess).
●Testprocess(afterobtainingpermissiontodoso).
●Identifygapsinpolicy,procedureandactualpractice.
●IdentifyprocessesthatpermitauthorizationandauthenticationthroughmeansthatarenotprotectedbyMFA.
●Inventorythemethodofhuman-basedauthentication,reviewforbestpractices.
Hiring
●Ensurethereisanestablishedprocessforreportingsuspicionofcandidateimpersonationorfraud,andthatallrecruitersandhiringmanagersreceiveawarenesstrainingaboutthetrendsandthereportingprocess.
●Reviewidenti?cationveri?cationprocessesfornewemployees.Ensurethereisenhancedveri?cationofIDsforallapplicantstodetectforgedidentities.
Considerusingidenti?cationserviceswhichareFIDOAlliancecerti?edforbestpractices:
o
GetCerti?edforFaceVeri?cation|FIDOAlliance-FIDOAlliance
o
IdentityVeri?cationCerti?cationPrograms|FIDO-FIDOAlliance
o
BattlingDeepfakeswithCerti?edIdentityVeri?cation|FIDOAlliance-FIDO
Alliance
●Includelanguageinjobpostingsstatingthatreasonableinterviewaccommodationswillbeprovideduponrequestbuttheexpectationisnoaudioorvideomanipulationmethodswillbeallowedduringtheinterviewprocess.
●Educatecandidatesthatareinvitedtointerviewthatyouhaveprocessesfor
identifyingcandidateimpersonators.Also,letthemknowthatyouwillprosecutealldiscoveredemploymentfraud.(Sullivan,2020)
●Implementaseriesofinterviewswithdifferentteammembersandwherepossiblevarytheformat(video,phone,in-person)andtimingofinterviews.
●Whenacandidateisselectedforaninterview,ensuretheprocessforschedulingthatinterviewincludesadisclosurethattheinterviewmustbeconductedwiththe
cameraon,nobackgroundblurringorbackdrops,noaudioorvideomanipulationor?ltering,noheadphones,withtheirscreenshared.Stateagainthatrequestsfor
reasonableaccommodationsforassistivetechnologymaybemadeatthispoint.
●Auditallofyourhiringpracticestoensureyourhiringteamisconsistentlyfollowingbestpracticesonbackgroundchecks,references,resumereview,interviews,andmore.
SensitiveDataDisclosure
●Reviewcurrentpolicyandproceduresforsensitivedatadisclosurewhichmayincludemergersandacquisitions,legal,?nancialtransactions,andemployeeinformation(HR)disclosures.
●Interviewemployeesinthosedepartmentstodeterminethecurrentwork?ow(whichmaybedifferentthandocumentedpolicyorprocess).
Version:1Page12of35
|GuideforPreparingandRespondingtoDeepfakeEvents
●Identifygapsinpolicy,procedureandactualpractice.
●IdentifyprocessesthatpermitauthorizationandauthenticationthroughmeansthatarenotprotectedbyMFA.
●Inventorythemethodofhuman-basedauthentication,andreviewforbestpractices.
●Scheduleareviewoftheseproceduresonatleastanannualbasis,asbestpracticesoftenchangeaccordingtocurrentthreatlandscape.
BrandMonitoring
●Completeaninventoryofallthedepartments,toolsandservicesleveragedbythe
organizationforbrandandreputationmonitoring.Oftenthismonitoringisconductedbymultipleteams(CTI,legalbrandprotection,etc).
●Reviewmonitoringservicesandplatformstodetermineifdeepfakealertingiswithinscope.
●Ensurethosedepartmentsareeducatedandtrainedontheprocedureforreportingdeepfakes.
EventResponse
●Identifycurrentmechanismsforreportingdeepfakes,anycurrentguidanceorawarenessfordeepfakes.
●Reviewforensicretainerstodetermineifdigitalforensicsexpertisefordeepfakeanalysisisincluded,andwhattheservicelevelagreement(SLA)forthatanalysisis.
●Determinewhatserviceormechanismyourorganizationusesfortakedownrequestsforlook-alikedomainsandothercopyrightviolationsanddetermineifthatserviceorprocessisalsoequippedtohandletakedownrequestsfordeepfakecontent(Gesseretal.,2023).
●Revieworestablishadeepfakeincidentresponseplan.
DeepFakeIncidentResponsePlan
Nowthatyouhavedonethecriticalhomeworkinyourriskassessmentphaseandunderstandthreats,threatactivity,andprocessesrelevanttoyourspeci?corganization,youcandevelopa
deepfakeincidentresponseplan.Adeepfakeincidentresponseplaniscriticalasduringanevent,havingclearlyoutlinedrolesandresponsibilities,templatesforcommunication,andan
understandingofhowtorespondiscrucialtoatimelyresponse.Aquickresponsehelpsan
Mitigateorreducereputationaldamage
organization:
●Protectsensitiveinformation
●Preservetrustandcredibility
●Ensure?nancialimpactsarelimited
●Adheretolegalandregulatorycompliancerequirements
●Ensureoperationalcontinuity
●IdentifyopportunitiesformitigationandensurestrategyandprocessesareinplaceAhelpfuldiagramforstartingthisplanningisprovidedinadocumentfromtheDepartmentof
HomelandSecuritycalled“IncreasingThreatofDeepFakeIdentities.”theopportunitiesfor
Version:1Page13of35
|GuideforPreparingandRespondingtoDeepfakeEvents
mitigationidenti?ed:
Establishgovernancestructurestooverseesecuritymeasuresandpoliciesrelated
Thedeepfakeincidentresponseplanningprocessshould,ataminimum(Gesseretal.,2022):todeepfakethreats.
●Documentwhoownsmonitoringfordeepfakes,whatisthealertingprocess,channels,andstakeholders.
●Documentwhoownsthetakedownprocessfordeepfakes,andhowescalationisconducted,suchaslegalactionifatakedownrequestisdenied.
●Createacrisiscommunicationplanforeachtypeofthedeepfakescenariosdescribedbelow.Inallscenarios,quickandeffectivecommunicationiskeytocontainmentinresponse.
○Ensurethattemplatesaredevelopedandapprovedbyallpartieswithwell-de?nedapprovalprocessesforwhentoimplementthem.
○Ensuredistributionplansandtemplatesareupdatedregularly.
●Organizationsshouldconsiderwhetherthedeepfakesarepartofalargercampaignintendedtoharass,exactrevenge,orextortacompanyorindividuals.Incident
responseplansshouldaccountforthefollowingimplications(Gesseretal.,2023):
○Reputationaldamage.
○Extortionpressurefollowingaransomwareordataex?ltrationevent.
○Hacktivism/corporateactivism.
○Financialfraud.
Version:1Page14of35
|GuideforPreparingandRespondingtoDeepfakeEvents
○Sensitiveinformationdisclosure.
○Industrialespionage.
○Computerornetworkbreaches.
○Misleadingstakeho
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 二零二五年護士護理教育項目勞動合同3篇
- 二零二五年生物醫(yī)藥研發(fā)與臨床試驗合同6篇
- 二零二五版智能家居系統(tǒng)集成與裝飾設(shè)計合同范本3篇
- 二零二五版高標(biāo)準(zhǔn)預(yù)制混凝土構(gòu)件供應(yīng)合同3篇
- 二零二五版租賃住宅配套設(shè)施租賃服務(wù)合同2篇
- 二零二五版家居用品經(jīng)銷代理合同范本3篇
- 二零二五版互聯(lián)網(wǎng)公司高級經(jīng)理任職及期權(quán)激勵合同3篇
- 二零二五版便利店員工工作環(huán)境與設(shè)施改善服務(wù)合同3篇
- 湖南儲備糧代儲合同(2025年度)執(zhí)行細則范本3篇
- 二零二五版地鐵站商業(yè)廣告位租賃及裝修施工合同3篇
- 2024-2025學(xué)年成都高新區(qū)七上數(shù)學(xué)期末考試試卷【含答案】
- 定額〔2025〕1號文-關(guān)于發(fā)布2018版電力建設(shè)工程概預(yù)算定額2024年度價格水平調(diào)整的通知
- 2025年浙江杭州市西湖區(qū)專職社區(qū)招聘85人歷年高頻重點提升(共500題)附帶答案詳解
- 《數(shù)學(xué)廣角-優(yōu)化》說課稿-2024-2025學(xué)年四年級上冊數(shù)學(xué)人教版
- “懂你”(原題+解題+范文+話題+技巧+閱讀類素材)-2025年中考語文一輪復(fù)習(xí)之寫作
- 2025年景觀照明項目可行性分析報告
- 2025年江蘇南京地鐵集團招聘筆試參考題庫含答案解析
- 2025年度愛讀書學(xué)長參與的讀書項目投資合同
- 電力系統(tǒng)分析答案(吳俊勇)(已修訂)
- 化學(xué)-河北省金太陽質(zhì)檢聯(lián)盟2024-2025學(xué)年高三上學(xué)期12月第三次聯(lián)考試題和答案
- 期末復(fù)習(xí)試題(試題)-2024-2025學(xué)年四年級上冊數(shù)學(xué) 北師大版
評論
0/150
提交評論