Chuyển đến nội dung chính

What is NOVAM Project?

What is NOVAM Project?

Novam is a cyber-security platform that seeks to protect connected IoT devices while ensuring that they maintain connectivity, security, adaptability, and scalability through the implementation of Directed Acyclic Graph architecture. Additionally, Novam will focus on monitoring and mitigating security threats likely to face IoT devices through the utilization of distributed ledger technology (DLT), system defense techniques, and artificial intelligence (AI).

NOVAM uses distributed ledger technology and AI to automatically monitor and mitigate IoT threats from the secure boot chain, operating system, mobile application and network. NOVAM also provides auditing & regulatory compliance integration to threat monitoring and detection services to ensure system events are included on an immutable distributed ledger.

NOVAM Features:

  • Health Check: The NOVAM client comes with the ability to run a health check built into the core functionality. By default, this feature automatically checks the security settings of the NOVAM node before saving the results to a fle. This fle can be uploaded to a custom CDN right away, or in the case of not being connected to the network, can be queued to be uploaded in the future.
  • Automatic Remediation: Some of the vulnerabilities caught by a health check can be fxed automatically. These corrections will be carried out as soon as the vulnerability is found, as long as the node has a license token to cover the security fx and a network connection to post the transaction. 
An update stating which automatic fxes were deployed will be posted to the NOVAM Network once available. This allows vendors and other analysts to note any issues that may compromise their network
NOVAM’s automatic remediation function will leverage frmware and software provided by clients, businesses and organizations to insure complete and correct updates.

NOVAM  IMMUNE SYSTEM

Rapid cyber-threat detection and attestation in an enterprise is critical to the health of the network and protection of sensitive data. Instead of pre-defning what a bad actor and malicious behavior looks like, we aim to build an embryonic, self-adaptive, model of “normal” activity and behaviors to detect and prevent against abnormalities. 
Many existing security vendors have clouds where information about threats is fed in. Although optional, if all the individual systems are learning independently on the customer network, an AI should take advantage of information from other AI systems in the marketplace.
The immune system builds thorough network “vital sign” models of every user, device and network communication, ensuring total network immersion and understanding of “self”.
Using machine learning, the immune system is modeled after “self or state” of a device to establish normalized actions and pair signature-less static prevention with behavior detection. Endpoint and network activity is monitored to detect malicious behavior perpetrated by any type of threat, from advanced malware, to exploits and insider threats.

NOVAM Advantages

Distributed Ledger Technology
Novam mainly functions by utilizing DLT in order to identify, prevent, and mitigate any malicious attacks and threats to the connected IoT devices. Such threats are caused by compromised operating systems, networks, boot chains, and mobile applications.
Intuitive And Intelligent
Novam implements state-of-the –technology to assess IoT environments and provides users with ability to integrate auditing and regulatory compliance within the threat monitoring and detection services.
Transparent
Novam’s design has the capabilities of providing analytics, immutable records that can be used for auditing or in cases where the records are required for investigation purposes. This ensures transparency in all the operations carried out by Novam.
Secure
Novam will sign all messages on the platform using private keys from the Novam node. This will ensure that third parties will not be able to intercept the messages while providing a means for tracking track the origin of the message.

How Does NOVAM Work?

Novam’s system is designed to identify, alert, monitor, and initiate immune system responses and at the same time automatically mitigate, replace and quarantine potential threats. The layers of protection that Novam provides to its users ensure that all the applications on Novam are signed and verified by the health check solutions combined with trust hardware. This provides end-to-end protection since the platform will be stable and secure for applications as well as protect user’s data from malware.
NOVAM Focuses On Enterprise Networks And Devices:
Novam will protect enterprise networks and connected devices from cyber-attacks and unintended incidents. This will be through implementing DLT to provide businesses and organizations with an automated protection mechanism that features autonomous monitoring, identification, and response to threats.
Apart from providing organizations with data protection and authentication for their network, devices, and users, Novam ensures compliance with data and privacy regulations, while enabling the organization to identify compliance issues in their systems and become compliant.
Novam Tokens will be the platform’s utility tokens, as they will provide the token holders with the access to the distributed ledger capabilities and services that include monitoring, auditing, mitigation, and compliance. Furthermore, the token will decentralize the purchase of software licenses on the platform and reduce the cost associated with purchasing the licenses.

Team:



Roadmap:


Token Sales Detail:

  • Token: MNVM
  • Token protocol: ERC20
  • Total token supply: 2,000,000,000
  • Token sale date: 10 December, 2018 – 10 January, 2018
  • Exchange rate: 1 MNVM = $0.06 USD
  • Accepted currencies: ETH, USD
  • Soft Cap: $500,000 USD
  • Hard Cap: $2,076,923 USD

For more information:

Author: tinhkhuat

Nhận xét

Bài đăng phổ biến từ blog này

What is JOYS project?

What is JOYS project? Jоуѕ iѕ аn ореn global blockchain platform that integrates blосkсhаin рrоjесtѕ аnd crypto-currency into thе сlаѕѕiсаl real economy. Benefits dеrivеd frоm inсrеаѕing ѕаlеѕ аt thе expense оf new сuѕtоmеrѕ with сrурtосurrеnсу, уоu саn invеѕt in уоur оwn blосkсhаin dеvеlорmеnt based оn thе experience of working with Joys. Thiѕ will save thе buѕinеѕѕ from еrrоrѕ and will рrоtесt invеѕtоrѕ frоm invеѕting budgеtѕ for rеѕеаrсh and development оf blосk projects. Jоуѕ uses tесhnоlоgiеѕ thаt help tо kеер the legal рuritу of using Crурtо- currency in sales аѕ muсh as роѕѕiblе under the аррliсаblе law. Jоуѕ рауѕ special аttеntiоn to lеgаl iѕѕuеѕ tаking intо ассоunt the legislation оf the соuntriеѕ whеrе thе рrоjесt will bе рrеѕеntеd. How does Joys work? I. For other projects and their cryptocurrencies/tokens Projects with their own crypto currency can ensure its reception in any store connected to the system. For example, the project has its own crypto currenc

What is Mitoshi Project?

What is Mitoshi Project? Mitoshi is the next generation of online gaming and crypto-lotteries powered by the blockchain. Centralization in global lotteries today heavily hinder the growth of lotteries. Taxation, slow payouts and regulations is hurting the industry. Mitoshi CryptoLotto aims to solve this using smart contracts on a blockchain platform. Mitoshi CryptoLotto will bring forth a completely transparent and fair lottery experience to the global market. Players will be able to enjoy a wide array of lottery games with nearly instant payouts. They will be able to enjoy a completely transparent platform that ensures fairness and enjoyment in their gaming. We are taking Mitoshi to the forefront of the lottery by leveraging on the power of smart contracts on a blockchain platform. By making use of smart contracts, we will build the future of online lottery that is globally accessible in a fair, transparent and secure environment. So you can have the confidence to bet on a win

What is Elisia Project?

What is Elisia Project? Elisia is the most exciting development in the blockchain world since Satoshi Nakamoto unleashed Bitcoin in 2008. Elisa provides lightning fast transactions with no fee. Each Elisia transaction will reach its destination in lightning speed without any fee to sender or receiver! Decentralized Applications (DAPPS) can be created with ease and deployed on the Elisia network with a click of a button without any fee for deployment. At Elisia we propose a blockchain solution, which synchronizes all of the blockchain development platforms in a common platform and provide a unified interface to develop and deploy the blockchain based public and private applications on a master chain (Elisia) or sub chains like other Dapp building platforms with a single click or minor adjustments. Elisia blockchain is a delegated proof of stake (DPOS) chain with the side chains comprising of different algorithms like proof of stake (POS), proof of work (POW), delegated proof o