diff --git a/assets/logos/EttuLogo.png b/assets/logos/EttuLogo.png new file mode 100644 index 00000000..6738a103 Binary files /dev/null and b/assets/logos/EttuLogo.png differ diff --git a/src/research/index.md b/src/research/index.md index bfe1d0cd..021b9e7c 100644 --- a/src/research/index.md +++ b/src/research/index.md @@ -7,7 +7,7 @@ Many analytics tasks are based on information that is initially incomplete, inco ------ -## BlackHatInsider Threat Detection +## EttuInsider Threat Detection One of the greatest threats to a the security of a database system comes from within: Users who have been granted access to data using it in a malicious or illegitimate way. Our goal is to develop new types of statistical signatures for a user or role's behavior as they access a database. Using these signatures, we can identify non-standard behvaior that could be evidence of malicious activity. ------ diff --git a/src/research/insider-threats/index.erb b/src/research/insider-threats/index.erb index e904794d..e47d3c03 100644 --- a/src/research/insider-threats/index.erb +++ b/src/research/insider-threats/index.erb @@ -7,7 +7,7 @@ datasets: --- -/BlackHat.png" alt="BlackHat" width="104" height="104" style="float: left; margin-top: 20px"/> +/EttuLogo.png" alt="Ettu" width="104" height="104" style="float: left; margin-top: 20px"/>

Insider Threat Detection

@@ -38,8 +38,3 @@ datasets:
  • "><%=ds["name"]%> (<%=ds["year"]%>)
    <% end %> - -
    - -

    (with apologies to Randal Munroe for theft of a temporary logo)

    -