Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data

Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data
ISBN-10
0128005068
ISBN-13
9780128005064
Category
Computers
Pages
182
Language
English
Published
2014-11-25
Publisher
Syngress
Authors
Jason Martin, Mark Talabis, Robert McPherson

Description

Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques. Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type. The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization. Written by security practitioners, for security practitioners Real-world case studies and scenarios are provided for each analytics technique Learn about open-source analytics and statistical packages, tools, and applications Step-by-step guidance on how to use analytics tools and how they map to the techniques and scenarios provided Learn how to design and utilize simulations for "what-if" scenarios to simulate security events and processes Learn how to utilize big data techniques to assist in incident response and intrusion analysis

Other editions

Similar books

  • Security Analytics: A Data Centric Approach to Information Security
    By Mehak Khurana, Shilpa Mahajan

    This book is a medium to funnel creative energy and develop new skills of hacking and analysis of security and expedites the learning of the basics of investigating crimes, including intrusion from the outside and damaging practices from ...

  • Cybersecurity Analytics
    By Rakesh M. Verma, David J. Marchette

    Outside the closed world: On using machine learning for network intrusion detection. In IEEE Symposium on Security and Privacy, pages 305–316, 2010. ... Pearson Education, 2012. Efstathios Stamatatos. A survey of modern authorship ...

  • Cyber Security: Analytics, Technology and Automation
    By Pekka Neittaanmäki, Martti Lehto

    The book gives a profound idea of the most spoken phenomenon of this time. The book is suitable for a wide-ranging audience from graduate to professionals/practitioners and researchers.

  • Security Analytics for the Internet of Everything
    By Al-Sakib Khan Pathan, Mohuiddin Ahmed, Abu S.S.M Barkat Ullah

    The book also includes some chapters written in a tutorial style so that general readers can easily grasp some of the ideas.

  • Machine Learning Approaches in Cyber Security Analytics
    By Tony Thomas, Athira P. Vijayaraghavan, Sabu Emmanuel

    ID3 algorithm which is based on the concept learning system (CLS) algorithm was developed by Ross Quinlan in 1975. ID3 algorithm usually uses nominal features for classification with no missing values. In 1993, Ross Quinlan again ...

  • Information Fusion for Cyber-Security Analytics
    By Izzat M Alsmadi, George Karabatis, Ahmed Aleroud

    This book highlights several gaps that have not been addressed in existing cyber security research.

  • Big Data Analytics in Cybersecurity
    By Onur Savas, Julia Deng

    Computer and Digital Forensics Blog, Cyber Security and Digital Forensics: Two Sides of the Same Coin. ... Network Security and Cyber Security—What Is the Difference. ... In: How to Cheat at Securing Linux.

  • Cyber Security Intelligence and Analytics
    By Kim-Kwang Raymond Choo, Zheng Xu, Ali Dehghantanha

    This book presents the outcomes of the 2019 International Conference on Cyber Security Intelligence and Analytics (CSIA2019), an international conference dedicated to promoting novel theoretical and applied research advances in the ...

  • Business Analytics and Cyber Security Management in Organizations
    By , Rajagopal, Ramesh

    Outlining updated discourse for business analytics techniques, strategies for data storage, and encryption in emerging markets, this book is ideal for business professionals, practicing managers, and students of business.

  • Cyber Security Intelligence and Analytics: 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA2021), Volume 2
    By Zheng Xu, Xiaolu Zhang, Reza M. Parizi

    This book presents the outcomes of the 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), an international conference dedicated to promoting novel theoretical and applied research advances in the ...