Information Security Analytics

Finding Security Insights, Patterns, and Anomalies in Big Data

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Information Security Analytics by Mark Talabis, Robert McPherson, Jason Martin, Inez Miyamoto, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Mark Talabis, Robert McPherson, Jason Martin, Inez Miyamoto ISBN: 9780128005064
Publisher: Elsevier Science Publication: November 25, 2014
Imprint: Syngress Language: English
Author: Mark Talabis, Robert McPherson, Jason Martin, Inez Miyamoto
ISBN: 9780128005064
Publisher: Elsevier Science
Publication: November 25, 2014
Imprint: Syngress
Language: English

Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques.

Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type.

The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization.

  • Written by security practitioners, for security practitioners
  • Real-world case studies and scenarios are provided for each analytics technique
  • Learn about open-source analytics and statistical packages, tools, and applications
  • Step-by-step guidance on how to use analytics tools and how they map to the techniques and scenarios provided
  • Learn how to design and utilize simulations for "what-if" scenarios to simulate security events and processes
  • Learn how to utilize big data techniques to assist in incident response and intrusion analysis
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis techniques.

Information Security Analytics dispels the myth that analytics within the information security domain is limited to just security incident and event management systems and basic network analysis. Analytic techniques can help you mine data and identify patterns and relationships in any form of security data. Using the techniques covered in this book, you will be able to gain security insights into unstructured big data of any type.

The authors of Information Security Analytics bring a wealth of analytics experience to demonstrate practical, hands-on techniques through case studies and using freely-available tools that will allow you to find anomalies and outliers by combining disparate data sets. They also teach you everything you need to know about threat simulation techniques and how to use analytics as a powerful decision-making tool to assess security control and process requirements within your organization. Ultimately, you will learn how to use these simulation techniques to help predict and profile potential risks to your organization.

More books from Elsevier Science

Cover of the book Radar Imaging of the Ocean Waves by Mark Talabis, Robert McPherson, Jason Martin, Inez Miyamoto
Cover of the book A Quick Guide to Welding and Weld Inspection by Mark Talabis, Robert McPherson, Jason Martin, Inez Miyamoto
Cover of the book Earth and Life Processes Discovered from Subseafloor Environments by Mark Talabis, Robert McPherson, Jason Martin, Inez Miyamoto
Cover of the book Biological Markers in Psychiatry and Neurology by Mark Talabis, Robert McPherson, Jason Martin, Inez Miyamoto
Cover of the book 23rd European Symposium on Computer Aided Process Engineering by Mark Talabis, Robert McPherson, Jason Martin, Inez Miyamoto
Cover of the book Evaluating Environmental and Social Impact Assessment in Developing Countries by Mark Talabis, Robert McPherson, Jason Martin, Inez Miyamoto
Cover of the book Global Mobility of Research Scientists by Mark Talabis, Robert McPherson, Jason Martin, Inez Miyamoto
Cover of the book Progress in Optics by Mark Talabis, Robert McPherson, Jason Martin, Inez Miyamoto
Cover of the book A Roadmap for Curing Cancer, Alzheimer's, and Cardiovascular Disease by Mark Talabis, Robert McPherson, Jason Martin, Inez Miyamoto
Cover of the book Human Parasitology by Mark Talabis, Robert McPherson, Jason Martin, Inez Miyamoto
Cover of the book Optical Sources, Detectors, and Systems by Mark Talabis, Robert McPherson, Jason Martin, Inez Miyamoto
Cover of the book Postharvest Biology and Technology of Tropical and Subtropical Fruits by Mark Talabis, Robert McPherson, Jason Martin, Inez Miyamoto
Cover of the book Down Syndrome: From Understanding the Neurobiology to Therapy by Mark Talabis, Robert McPherson, Jason Martin, Inez Miyamoto
Cover of the book Plastic Pipe Systems: Failure Investigation and Diagnosis by Mark Talabis, Robert McPherson, Jason Martin, Inez Miyamoto
Cover of the book Hydraulic Rubber Dam by Mark Talabis, Robert McPherson, Jason Martin, Inez Miyamoto
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy