<p><i>Information Security Analytics</i> gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques.</p> <p><i>Information Securit
Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data
โ Scribed by Mark Talabis, Robert McPherson, I Miyamoto, Jason Martin
- Publisher
- Syngress
- Year
- 2014
- Tongue
- English
- Leaves
- 172
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques.
Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type.
The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization.
- Written by security practitioners, for security practitioners
- Real-world case studies and scenarios are provided for each analytics technique
- Learn about open-source analytics and statistical packages, tools, and applications
- Step-by-step guidance on how to use analytics tools and how they map to the techniques and scenarios provided
- Learn how to design and utilize simulations for "what-if" scenarios to simulate security events and processes
- Learn how to utilize big data techniques to assist in incident response and intrusion analysis
โฆ Table of Contents
Content:
Front Matter, Page iii
Copyright, Page iv
Dedication, Page v
Foreword, Pages xi-xii
About the Authors, Pages xiii-xiv
Acknowledgments, Page xv
Chapter 1 - Analytics Defined, Pages 1-12
Chapter 2 - Primer on Analytical Software and Tools, Pages 13-22
Chapter 3 - Analytics and Incident Response, Pages 23-66
Chapter 4 - Simulations and Security Processes, Pages 67-98
Chapter 5 - Access Analytics, Pages 99-121
Chapter 6 - Security and Text Mining, Pages 123-150
Chapter 7 - Security Intelligence and Next Steps, Pages 151-161
Index, Pages 163-166
๐ SIMILAR VOLUMES
<p><span>The book gives a comprehensive overview of security issues in cyber physical systems by examining and analyzing the vulnerabilities. It also brings current understanding of common web vulnerabilities and its analysis while maintaining awareness and knowledge of contemporary standards, pract
In recent years, technological advances have led to significant developments within a variety of business applications. In particular, data-driven research provides ample opportunity for enterprise growth, if utilized efficiently. Privacy and Security Policies in Big Data is a pivotal reference sour
<p><span>Big Data analytics is the complex process of examining big data to uncover information such as correlations, hidden patterns, trends and user and customer preferences, to allow organizations and businesses to make more informed decisions. These methods and technologies have become ubiquitou
<p>Big Data analytics is the complex process of examining big data to uncover information such as correlations, hidden patterns, trends and user and customer preferences, to allow organizations and businesses to make more informed decisions. These methods and technologies have become ubiquitous in a
The application of data warehousing and data mining techniques to computer security is an important emerging area, as information processing and internet accessibility costs decline and more and more organizations become vulnerable to cyber attacks. These security breaches include attacks on single