OWASP:深度偽造事件響應(yīng)指南(英文)_第1頁
OWASP:深度偽造事件響應(yīng)指南(英文)_第2頁
OWASP:深度偽造事件響應(yīng)指南(英文)_第3頁
OWASP:深度偽造事件響應(yīng)指南(英文)_第4頁
OWASP:深度偽造事件響應(yīng)指南(英文)_第5頁
已閱讀5頁,還剩65頁未讀 繼續(xù)免費閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認(rèn)領(lǐng)

文檔簡介

LLM&GenAlThreatIntelligenceInitiative

|GuideforPreparingandRespondingtoDeepfakeEvents

RevisionHistory

Revision

Date

Authors

Description

.01

June28,2024

RachelJames

BryanNakayama

FirstDraft

.03

July9th,2024

RachelJames

BryanNakayamaSarahThorton

RameshKumarVaibhavMalik

FeedbackandSecondDraft

.05

August6th,2024

RachelJames

BryanNakayamaSarahThorton

RameshKumar

VaibhavMalik

ManuelVillanueva

FourthDraft

1

September10,2024

RachelJames

BryanNakayama

Published

Theinformationprovidedinthisdocumentdoesnot,andisnotintendedto,constitutelegaladvice.Allinformationisforgeneralinformationalpurposesonly.Thisdocumentcontainslinkstoother

third-partywebsites.SuchlinksareonlyforconvenienceandOWASPdoesnotrecommendorendorsethecontentsofthethird-partysites.

Version:1Page2of35

|GuideforPreparingandRespondingtoDeepfakeEvents

LicenseandUsage

ThisdocumentislicensedunderCreativeCommons,CCBY-SA4.0Youarefreeto:

●Share—copyandredistributethematerialinanymediumorformat

●Adapt—remix,transform,andbuilduponthematerialforanypurpose,evencommercially.

Underthefollowingterms:

●Attribution—Youmustgiveappropriatecredit,providealinktothelicense,andindicateifchangesweremade.Youmaydosoinanyreasonablemanner,butnotinanywaythatsuggeststhelicensorendorsesyouoryouruse.

○AttributionGuidelines-mustincludetheprojectnameaswellasthenameoftheassetreferenced

■OWASPTop10forLLM-GuideforPreparingandRespondingtoDeepfakeEvents

●ShareAlike—Ifyouremix,transform,orbuilduponthematerial,youmustdistributeyourcontributionsunderthesamelicenseastheoriginal.

Linktofulllicensetext:/licenses/by-sa/4.0/legalcode

Version:1Page3of35

|GuideforPreparingandRespondingtoDeepfakeEvents

Contents

NotefromOWASPCTILayerLeadAuthors 5

Overview 6

Scope 7

Preparation 8

Riskassessment 8

ThreatActors 8

ThreatActivity 9

AssessmentofDefenses 9

Human-BasedAuthenticationBestPractices 10

FinancialTransactions 10

Helpdesk 11

Hiring 11

SensitiveDataDisclosure 11

BrandMonitoring 12

EventResponse 12

DeepFakeIncidentResponsePlan 12

AwarenessTraining 14

EventSpecificGuidance 16

Financialgainthroughfraudbyimpersonation 16

DetectionandAnalysis: 16

CommonTTPs: 16

Containment,EradicationandRecovery: 18

Post-IncidentActivity: 19

Impersonationforcyberattacks 20

DetectionandAnalysis: 20

CommonTTPs: 20

Containment,EradicationandRecovery: 22

Post-IncidentActivity: 23

JobInterviewFraud 24

DetectionandAnalysis: 24

CommonTTPs: 26

Containment,EradicationandRecovery: 27

Post-IncidentActivity: 27

Mis/Dis/MalInformation 28

DetectionandAnalysis 28

CommonTTPs: 29

Version:1Page4of35

|GuideforPreparingandRespondingtoDeepfakeEvents

Containment,EradicationandRecovery: 30

Post-IncidentActivity: 31

Conclusion 32

References 33

Version:1Page5of35

|GuideforPreparingandRespondingtoDeepfakeEvents

NotefromOWASPCTILayerLeadAuthors

Earlyin2024,theOWASPTop10forLLM&GenAIcommunityexpresseda

greatdealofinterestincoveringtheadversarialuseofarti?cial

intelligence.Onre?ection,thecoreteamdeterminedthatsince

vulnerabilitieswithinAIsystemswastheprimaryfocusoftheTop10,guidanceonadversarialusefelloutsidethescopeofthatpublication.TheOWASPcommunitycametogetherandvolunteeredtocreatea

separateresourcegroup,onethatwouldfocusoncreatingactionableguidance,checklistsandresearchintoadversarial

useforcybersecurityprofessionals.Thatgroup

becameknownastheCTILayerteam,ledbyRachelJamesandBryanNakayama.

ThisGuideforPreparingandRespondingtoDeepfakeEventsisthe?rstofseveralplannedpublicationsoftheCTILayer.Thispublicationwasdevelopedby

cybersecurityprofessionalsforcybersecurityprofessionals.Weintendedto

providepracticalguidanceforatechnicalandleadershipaudiencewhomust

createplaybooks,responseplansandquicklyrespondtoadeepfakeevent.Itisthehopeoftheauthorsandcontributorsofthisdocumentthatwecanimprovethecultivationofbestpracticesandprovideacomprehensiveoverviewofwhatisinvolvedinpreparing,detecting,andrespondingtosuchevents.

RachelJames,CISSP,CISA,OSCP,GMLE

CyberShujinLLC

racheljames@

BryanNakayama,Ph.D.

CTIProfessional

bryan.nakayama@

Version:1Page6of35

|GuideforPreparingandRespondingtoDeepfakeEvents

Overview

Deepfakes—hyper-realisticdigitalforgeries—havegainedsigni?cantattentionastherapid

developmentofgenerativeAIhasmadeiteasiertoproduceconvincinglyrealisticvideosandaudiorecordingsthatcandeceiveeventhemostdiscerningviewers.Theyposeapotentiallydaunting

challengeforcybersecurityprofessionalssincefraudstersandcybercriminalscanleverage

deepfakestocarryoutsophisticatedimpersonationandsocialengineeringattacks.Duetothe

widespreaduseofsocialmedia,everyonefromhigh-pro?leindividualslikeCEOstoaverage

citizensareattheriskofimpersonationsinceitcantakeaslittleas10secondsofaudioorvideotoproduceaconvincingdeepfake.Deepfake-generatedcontenthasalreadybeenusedinphishing

andfraudschemes,whereattackerscreatedvideosofCEOsandothertrusted?guresto

manipulateemployeesintodivulgingsensitiveinformationand/ortransferringfunds(Chen&Magramo,2024).

Whiledeepfakesareapowerfultoolforsocialengineering,cybersecurityprofessionalsdo

notneedtoturntonewdetectiontechnologiesorintensive“howtospotadeepfake”training

programsinordertomitigatetheriskthattheypose.Recentstudiessuggestthatdeepfake

detectiontechnologiesarestillimmatureandtherapidadvanceofthetechnologywillmake

trainingprogrammesfocusedonlookingforspeci?cvisualoraudioartifactsrapidlyout-of-date

(GAO,2024).Moreover,researchershavediscoveredthatevenwithtrainingpeoplebothcannot

reliablydetectdeepfakesandtendtooverestimatetheirownabilitytoidentifydeepfakes(K?bisetal.,2021).Likemanyothersocialengineeringattacks,deepfake-enhancedattacksfrequently

dependonthevictimbypassingestablishedproceduresandcontrolsatthebehestoftheattacker.Therefore,thisguideemphasizespracticalandpragmaticdefense-in-depthstrategiesaswellaslayeredcontrolsasakeyapproachthatcybersecurityprofessionalsshouldtaketodeepfakes.

Thehopeistoprovideaguidethatisresilienttoevolvingdeepfake-enhancedthreatsby

Focusingonprocessadherenceratherthanvisualorauditorydetectionoffakes.

applyingfundamentalsecurityprinciples.Keystrategiesthattheguideendorsesinclude:

●Implementingandmaintainingstrong?nancialcontrolsandveri?cationprocedures.

●Cultivatingacultureofawarenessandskepticismtowardsunusualrequests.

●Developingandregularlyupdatingincidentresponseplans.

The?rstsectionintheguideistheScopewhichoutlineskeyde?nitionsandtheintended

audience.Theguidedistinguishesbetweenfourdifferentscenariosbasedonattackerintentions—?nancialfraud,jobinterviewfraud,socialengineering,mis/dis/malinformation—andprovides

guidanceacrossthefourstagesofincidentresponsefromNISTSpecialPublication800-61Revision3:

1.Preparation,

2.DetectionandAnalysis,

3.Containment,EradicationandRecovery

4.Post-incidentactivity

Version:1Page7of35

|GuideforPreparingandRespondingtoDeepfakeEvents

Scope

Syntheticmediaintendedtoreproducesomeone’slikenessisgenerallydividedintotwo

Cheapfakes-Multimediathathasbeenmanipulatedusingtechniquesthatdonot

involvemachine/deeplearning,whichinmanycasescanstillbeaseffectiveasthemoretechnicallysophisticatedtechniques,areoftenreferredtoasshalloworcheapfakes.

●Deepfakes-Multimediathathaveeitherbeencreated(fullysynthetic)oredited

(partiallysynthetic)usingsomeformofmachine/deeplearning(arti?cialintelligence)arereferredtoasdeepfakes.

Wewillfocusthisguidanceonthreecategoriesofmaliciousdeepfakesbasedontheattacker’sobjective:

categories(DOD,2023):

1.Financialgainthroughfraudbyimpersonation

2.Jobinterviewfraud

3.Impersonationtofurthercyberattacks(suchasinitialaccess)

4.Mis/Dis/Malinformation

Mostorganizationsoutsidegovernmentandjournalisticentitieswillpotentiallybetargeted

foroneofthesethreeobjectives.Basedonpublicandprivateintelligencesources,webelievetherehasbeenaminorbutmeasurableincreaseinactivityfromthesethreecategoriesimpacting

organizationssincemid-2023.

Weseparatemaliciousdeepfakeactivityintothreecategoriesbecausethepreparationand

responseforeacharedifferent.Forexample,ifathreatactorattemptstouseadeepfakeforfraudortrickahelpdeskemployeeintogivingthemaccess,youareunlikelytobefortunateenoughto

haveanycapturedvideooraudiotoanalyze,norwillthecontentbehostedonaplatform.Inthe

caseofmis/dis/malinformation,therewilllikelybesomemediatoanalyzeandatake-downprocesstobeconducted.

Whilethisguideprovidespreparationguidancethatisencompassingofallthreecategoriesofdeepfakeevents,thesubsequentDetectionandAnalysis;Containment,Eradicationand

Recovery,andPost-IncidentActivityguidanceareevent-speci?c.

Version:1Page8of35

|GuideforPreparingandRespondingtoDeepfakeEvents

Preparation

Preparationfocusesonunderstandingthecurrentriskthroughanalysisofthreatactivityandcurrentdefensiveposture,establishingadeepfakeincidentresponseplan,and?nally,establishingadeepfakereportingprocessandemployeeeducation.

Riskassessment

Atthetimeofwriting(July2024),deepfakesarenottheleadingcauseoffraud,cyberthreatactivityorreputationaldamageformostorganizationsoutsideofjournalisticandgovernment

entities.Thatsaid,publicandprivatecyberthreatintelligencesourcesindicatethattheuseof

deepfakesandcheapfakesby?nanciallymotivatedthreatactorshasseenaminorincrease.Asthetechnologyprogresses,itwillbecomeeasierandcheapertocreateadeepfakethatisgoodenoughforbroadattacks(Ciancaglini&Sancho,2024).

Aspartofpreparationfordeepfakeevents,organizationsshouldevaluatetheirownindividualriskofbecomingatargetofdeepfakesbasedontheirbusiness,mediaandpoliticalexposure,

history,threatactoractivity,andsusceptibilitytofraud.

ThreatActors

AnexcellentadversariallandscapegraphicproducedbyDARPA(Brooksetal.,2022),shownbelow,providesanunderstandingoftheadversarialskilllevelandtheobserveduseofthese

technologies.Thiswillhelporganizationsbetterdeterminewhichcategoryofdeepfaketechnicalcapabilitytheywillmostlikelyencounter.

ThisresearchalsoreflectsfindingsintheworkproducedbyOnfidoincollaborationwithFIDOAlliance,inthe2024IdentityFraudReport.

Version:1Page9of35

|GuideforPreparingandRespondingtoDeepfakeEvents

Theuptickinbiometricfraudanduseofcheapfakesanddeepfakesasameanstobypass

authenticationandcommitfraudhashadaminorobservableuptick.Theauthorsconcludethatthistrendhasseenaslightincreaseandthatwecanexpectthatincreasetocontinue.Therefore,this

windowofopportunityforcybersecurityprofessionalstodevelopawareness,detection,response,andmitigationstrategiesisideal.

ThreatActivity

Current,knownthreatsthatthesetechnologiesposeinclude:

1.Evasionofauthentication-

HowIBrokeIntoaBankAccountWithanAI-Generated

Voice

2.Impersonation-

UnusualCEOFraudviaDeepfakeAudioStealsUS$243,000FromUK

Company

3.FinancialFraud-

Financeworkerpaysout$25millionaftervideocallwithdeepfake

‘chief?nancialo代cer’

4.Reputationaldamage-afakebutrealisticvideoofaCEOmakingunsavory

commentsorincorrectstatementscandamagebrandimageandleadtoloss

Beware

ofdeepfakeofCEOrecommendingstocks,saysIndia'sNationalStockExchange

and

faketwitteraccountscausinglossestocompanyEliLillyandLockheedMartin

RespondingtoMaliciousCorporateDeepfakes–DebevoiseDataBlog

5.Deepfakeemploymentinterviews-

CriminalsUseDeepfakeVideostoInterviewfor

RemoteWork

6.Misinformationleadingto?nancialimplications-Suchasimpactingstockprices:

S&PSheds$500BillionfromFakePentagonExplosion

AssessmentofDefenses

Yourassessmentshouldincludeareviewofpolicies,procedures,enforcementandauditingmethodsforfourmainareas:sensitivedatadisclosure,helpdesk,?nancialtransactionsandeventresponse.

Werecommendstartingwithareviewofthegovernanceandapprovalstructurestooverseesecuritymeasuresandpoliciesrelatedtosensitivedatadisclosure,mergersandacquisitions,legal,?nancialtransactions,andemployeeidenti?cationforpurposesofauthorizationoridenti?cation

(suchaswiththehelpdesk,HR,andphysicalsecurity).Akeypartofthisreviewshouldinclude

interviewingemployeesenactingtheseprocessesinordertounderstandwhetherandtowhat

extenttherearedeviationsfrompolicy.Startingwiththisreviewwillallowyoutobeabletonavigate

Version:1Page10of35

|GuideforPreparingandRespondingtoDeepfakeEvents

successfullythroughthegovernanceandapprovalstructurestosuggestchangesandposturehardeningprocesses.

Human-BasedAuthenticationBestPractices

Ideally,atleasttwoofthefollowingbestpracticeswherehuman-basedauthenticationispermittedshouldbeinuse.Thesebestpracticesinclude:

●Maintainanemployeedirectoryofapprovedcommunicationmethodsthatcanactasadditionalveri?cationtoauthenticateausersuchascorporateinstantmessenger,additionalphonenumber,alternativeemailsoraliasesthatcanbeusedtocon?rmavoicerequest.

●AlternativeCommunicationVeri?cation:callingthepersonbackonapre-registeredphonenumbertocon?rmtheidentityandrequest.

●CodeoftheDay-inthispractice,oftenimplementedin?nancialinstitutions,

requiresthecallerorrequestertorefertoasecuresystemwhichgeneratesa

randomuniquecodethatrotatesonafrequentbasis.Despiteitsname,theCodeoftheDaytypicallyrotatesseveraltimesadayandisusedinconjunctionwithother

formsofverbalidenti?cation.Someorganizationsuseasecureapplicationthat

requiresMFAtoaccessthecurrentcode,whileothersdistributethecodethroughSMS.Usersmusthavetheabilitytorequestarotationofthecodeortoreporta

suspectedcompromiseofthecode,toallowforrotation-on-demandinadditiontofrequentautomaticrotations.Insituationswhereanemployeeisunableto

authenticatetotheapplicationordevicetogetthecode,itispermissiblefora

managerorcoworkertosharethecodeonlyinpersonandaftercon?rmingavalidemployeebadge(byswipingintoasecurearea).

●CustomSecurityQuestions:establishedwhenonboarding,orcreatedfor

third-partiesandkeptinencryptedstorage.Theseshouldnotbeanydatathatisabletobederivedfromacreditreport,socialmediaaccount,orthattheemployeeuses

routinely(dateofbirth,employeeID,employeeloginname,shouldnotbeused).

Disallowcommonquestionssuchas“Mother’sMaidenname”or“Pet’s?rstname.”

●Requirethecaller’smanagerorsupervisortoverifytherequestbysendinganemail,orconductinganoutboundcalltothemanageronapre-registeredphonenumber.

FinancialTransactions

Ensurethefollowingbestpracticesfor?nancialtransactionsarecontainedinwrittenpolicy

Clearwrittenpoliciesregarding?nancialtransactionsandcontrols.

andproceure,andhavemeansofenforcementandauditingforfailures:

●SoD(SeparationofDuties):Separatecriticalfunctionssothatnosingleindividual

hascontroloverallaspectsofany?nancialtransaction.Forexample,thepersonwhoauthorizesapaymentshoulddifferfromthepersonwhoprocessesit,andboth

shouldhaveindependentnon-overlappingdecision-making/justi?cationchainstodotheirpartsrespectively.

●DualAuthorization:Requiretwoauthorizedindividualstoapprovesigni?canttransactions.Thisensuresthateverypersoncanonlyinitiateandcompleteatransactionwithoversight.

●Considera“codeoftheday”techniquethatmustbestatedforanyauthorizationoftransactionsorsharingofsensitiveinformation.Accessingtheday'scoderequiresbothpartiestoaccessaportaldisplayingthecode.

●MFAonallsystemsforcommunicationand?nancialtransactionprocessing.

●IdentifyprocessesthatpermitauthorizationandauthenticationthroughmeansthatarenotprotectedbyMFA.

●Inventorythemethodofhuman-basedauthentication,andreviewforbestpractices.

●Dual-bandcommunicationveri?cationrequirestwotypesofauthenticationthatcannotcomethroughasinglecommunicationchannel.Forexample,Transactions

Version:1Page11of35

|GuideforPreparingandRespondingtoDeepfakeEvents

shouldnotbeabletoberequested,reviewed,orapprovedsolelythroughemailorphonecalls.

●Regularauditsandperiodicaccessreviewstoensuretheabove.

●Ensurecomplianceproceduresfor?nancialtransactionsprovidesigni?cantlatitudetochallengeseniorleadershiprequests.

●Requiremultipleapprovalsfortransactionsaboveacertainthreshold.

Helpdesk

●Reviewcurrentpolicyandproceduresforpasswordreset,newdeviceenrollmentintoMFA,andreportingforrepeatedfailedverbalauthenticationattempts.

●Interviewemployeesinthosedepartmentstodeterminecurrentwork?ow(whichmaybedifferentthandocumentedpolicyorprocess).

●Testprocess(afterobtainingpermissiontodoso).

●Identifygapsinpolicy,procedureandactualpractice.

●IdentifyprocessesthatpermitauthorizationandauthenticationthroughmeansthatarenotprotectedbyMFA.

●Inventorythemethodofhuman-basedauthentication,reviewforbestpractices.

Hiring

●Ensurethereisanestablishedprocessforreportingsuspicionofcandidateimpersonationorfraud,andthatallrecruitersandhiringmanagersreceiveawarenesstrainingaboutthetrendsandthereportingprocess.

●Reviewidenti?cationveri?cationprocessesfornewemployees.Ensurethereisenhancedveri?cationofIDsforallapplicantstodetectforgedidentities.

Considerusingidenti?cationserviceswhichareFIDOAlliancecerti?edforbestpractices:

o

GetCerti?edforFaceVeri?cation|FIDOAlliance-FIDOAlliance

o

IdentityVeri?cationCerti?cationPrograms|FIDO-FIDOAlliance

o

BattlingDeepfakeswithCerti?edIdentityVeri?cation|FIDOAlliance-FIDO

Alliance

●Includelanguageinjobpostingsstatingthatreasonableinterviewaccommodationswillbeprovideduponrequestbuttheexpectationisnoaudioorvideomanipulationmethodswillbeallowedduringtheinterviewprocess.

●Educatecandidatesthatareinvitedtointerviewthatyouhaveprocessesfor

identifyingcandidateimpersonators.Also,letthemknowthatyouwillprosecutealldiscoveredemploymentfraud.(Sullivan,2020)

●Implementaseriesofinterviewswithdifferentteammembersandwherepossiblevarytheformat(video,phone,in-person)andtimingofinterviews.

●Whenacandidateisselectedforaninterview,ensuretheprocessforschedulingthatinterviewincludesadisclosurethattheinterviewmustbeconductedwiththe

cameraon,nobackgroundblurringorbackdrops,noaudioorvideomanipulationor?ltering,noheadphones,withtheirscreenshared.Stateagainthatrequestsfor

reasonableaccommodationsforassistivetechnologymaybemadeatthispoint.

●Auditallofyourhiringpracticestoensureyourhiringteamisconsistentlyfollowingbestpracticesonbackgroundchecks,references,resumereview,interviews,andmore.

SensitiveDataDisclosure

●Reviewcurrentpolicyandproceduresforsensitivedatadisclosurewhichmayincludemergersandacquisitions,legal,?nancialtransactions,andemployeeinformation(HR)disclosures.

●Interviewemployeesinthosedepartmentstodeterminethecurrentwork?ow(whichmaybedifferentthandocumentedpolicyorprocess).

Version:1Page12of35

|GuideforPreparingandRespondingtoDeepfakeEvents

●Identifygapsinpolicy,procedureandactualpractice.

●IdentifyprocessesthatpermitauthorizationandauthenticationthroughmeansthatarenotprotectedbyMFA.

●Inventorythemethodofhuman-basedauthentication,andreviewforbestpractices.

●Scheduleareviewoftheseproceduresonatleastanannualbasis,asbestpracticesoftenchangeaccordingtocurrentthreatlandscape.

BrandMonitoring

●Completeaninventoryofallthedepartments,toolsandservicesleveragedbythe

organizationforbrandandreputationmonitoring.Oftenthismonitoringisconductedbymultipleteams(CTI,legalbrandprotection,etc).

●Reviewmonitoringservicesandplatformstodetermineifdeepfakealertingiswithinscope.

●Ensurethosedepartmentsareeducatedandtrainedontheprocedureforreportingdeepfakes.

EventResponse

●Identifycurrentmechanismsforreportingdeepfakes,anycurrentguidanceorawarenessfordeepfakes.

●Reviewforensicretainerstodetermineifdigitalforensicsexpertisefordeepfakeanalysisisincluded,andwhattheservicelevelagreement(SLA)forthatanalysisis.

●Determinewhatserviceormechanismyourorganizationusesfortakedownrequestsforlook-alikedomainsandothercopyrightviolationsanddetermineifthatserviceorprocessisalsoequippedtohandletakedownrequestsfordeepfakecontent(Gesseretal.,2023).

●Revieworestablishadeepfakeincidentresponseplan.

DeepFakeIncidentResponsePlan

Nowthatyouhavedonethecriticalhomeworkinyourriskassessmentphaseandunderstandthreats,threatactivity,andprocessesrelevanttoyourspeci?corganization,youcandevelopa

deepfakeincidentresponseplan.Adeepfakeincidentresponseplaniscriticalasduringanevent,havingclearlyoutlinedrolesandresponsibilities,templatesforcommunication,andan

understandingofhowtorespondiscrucialtoatimelyresponse.Aquickresponsehelpsan

Mitigateorreducereputationaldamage

organization:

●Protectsensitiveinformation

●Preservetrustandcredibility

●Ensure?nancialimpactsarelimited

●Adheretolegalandregulatorycompliancerequirements

●Ensureoperationalcontinuity

●IdentifyopportunitiesformitigationandensurestrategyandprocessesareinplaceAhelpfuldiagramforstartingthisplanningisprovidedinadocumentfromtheDepartmentof

HomelandSecuritycalled“IncreasingThreatofDeepFakeIdentities.”theopportunitiesfor

Version:1Page13of35

|GuideforPreparingandRespondingtoDeepfakeEvents

mitigationidenti?ed:

Establishgovernancestructurestooverseesecuritymeasuresandpoliciesrelated

Thedeepfakeincidentresponseplanningprocessshould,ataminimum(Gesseretal.,2022):todeepfakethreats.

●Documentwhoownsmonitoringfordeepfakes,whatisthealertingprocess,channels,andstakeholders.

●Documentwhoownsthetakedownprocessfordeepfakes,andhowescalationisconducted,suchaslegalactionifatakedownrequestisdenied.

●Createacrisiscommunicationplanforeachtypeofthedeepfakescenariosdescribedbelow.Inallscenarios,quickandeffectivecommunicationiskeytocontainmentinresponse.

○Ensurethattemplatesaredevelopedandapprovedbyallpartieswithwell-de?nedapprovalprocessesforwhentoimplementthem.

○Ensuredistributionplansandtemplatesareupdatedregularly.

●Organizationsshouldconsiderwhetherthedeepfakesarepartofalargercampaignintendedtoharass,exactrevenge,orextortacompanyorindividuals.Incident

responseplansshouldaccountforthefollowingimplications(Gesseretal.,2023):

○Reputationaldamage.

○Extortionpressurefollowingaransomwareordataex?ltrationevent.

○Hacktivism/corporateactivism.

○Financialfraud.

Version:1Page14of35

|GuideforPreparingandRespondingtoDeepfakeEvents

○Sensitiveinformationdisclosure.

○Industrialespionage.

○Computerornetworkbreaches.

○Misleadingstakeho

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

最新文檔

評論

0/150

提交評論