Jump to content

Rasputin, RASP stood for?


Accessing

Recommended Posts

Intelligence Officer

Intelligence Officer

  • [C] UNIT LEADER
  • ACCESS [4] TOP SECRET〔CW〕

If anyone knows Destiny, they might remember Rasputin a AI designed and built by the Clovis Bray Exoscience Corporation, one of the Golden Age's greatest collections of scientists and engineers. He was designed to foresee potential threats to human civilization and to leverage military assets for its protection if the need arose.

Rasputin (also identified as AI-COM/RSPN and the Tyrant) is a Warmind housed in the BrayTech Futurescape in the Hellas Basin. He was created during the Golden Age and was believed to have been destroyed during the Collapse until the Iron Lords awoke his wrath.

I recently came across this concept that mirrors the characters purpose and development.

Runtime application self-protection 

Runtime application self-protection (RASP) is a security technology that uses runtime instrumentation to detect and block computer attacks by taking advantage of information from inside the running software. The technology differs from perimeter-based protections such as firewalls, that can only detect and block attacks by using network information without contextual awareness. RASP technology is said to improve the security of software by monitoring its inputs, and blocking those that could allow attacks, while protecting the runtime environment from unwanted changes and tampering. RASP-protected applications rely less on external devices like firewalls to provide runtime security protection. When a threat is detected RASP can prevent exploitation and possibly take other actions, including terminating a user's session, shutting the application down, alerting security personnel and sending a warning to the user. RASP aims to close the gap left by application security testing and network perimeter controls, neither of which have enough insight into real-time data and event flows to either prevent vulnerabilities slipping through the review process or block new threats that were unforeseen during development.

Could it be inspiration or is this just a coincidence. 

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Who's Online   0 Members, 0 Anonymous, 6 Guests (See full list)

    • There are no registered users currently online
×
×
  • Create New...