Cargando…

Threat forecasting : leveraging big data for predictive analysis /

This book discusses the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Pirc, John (Autor), DeSanto, David (Autor), Davison, Iain (Autor), Gragido, Will (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cambridge, MA : Syngress is an imprint of Elsevier, 2016.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_ocn950518678
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 160525s2016 mau ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d IDEBK  |d UIU  |d EBLCP  |d OPELS  |d N$T  |d CDX  |d OCLCF  |d YDXCP  |d GGVRL  |d DEBSZ  |d UMI  |d STF  |d IDB  |d COO  |d VT2  |d MERUC  |d OCLCQ  |d OCLCO  |d U3W  |d OCLCA  |d WRM  |d CNCGM  |d D6H  |d OCLCQ  |d UOK  |d CEF  |d KSU  |d EZ9  |d OCLCQ  |d DEBBG  |d OCLCQ  |d WYU  |d UAB  |d LQU  |d DCT  |d OCLCQ  |d S2H  |d OCLCO  |d DST  |d LVT  |d OCLCO  |d OCL  |d OCLCQ  |d OCLCO 
019 |a 950689896  |a 951221751  |a 956735839  |a 957614854  |a 965800894  |a 968121545  |a 1105190366  |a 1105566135  |a 1162073197  |a 1300453184  |a 1302261844  |a 1303363666 
020 |a 9780128004784  |q (electronic bk.) 
020 |a 0128004789  |q (electronic bk.) 
020 |a 0128000066 
020 |a 9780128000069 
020 |z 9780128000069 
024 3 |a 9780128000069 
029 1 |a AU@  |b 000058949560 
029 1 |a AU@  |b 000066136148 
029 1 |a AU@  |b 000067093736 
029 1 |a AU@  |b 000068133336 
029 1 |a CHNEW  |b 001013572 
029 1 |a CHNEW  |b 001026569 
029 1 |a DEBBG  |b BV043893713 
029 1 |a DEBSZ  |b 480361274 
029 1 |a DEBSZ  |b 48247095X 
029 1 |a GBVCP  |b 879396334 
029 1 |a GBVCP  |b 897159225 
035 |a (OCoLC)950518678  |z (OCoLC)950689896  |z (OCoLC)951221751  |z (OCoLC)956735839  |z (OCoLC)957614854  |z (OCoLC)965800894  |z (OCoLC)968121545  |z (OCoLC)1105190366  |z (OCoLC)1105566135  |z (OCoLC)1162073197  |z (OCoLC)1300453184  |z (OCoLC)1302261844  |z (OCoLC)1303363666 
037 |a CL0500000806  |b Safari Books Online 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 043050  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
245 0 0 |a Threat forecasting :  |b leveraging big data for predictive analysis /  |c John Pirc, David DeSanto, Iain Davison, Will Gragido. 
264 1 |a Cambridge, MA :  |b Syngress is an imprint of Elsevier,  |c 2016. 
264 4 |c ©2016 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
500 |a Includes index. 
588 0 |a Online resource; title from PDF title page (ScienceDirect, viewed June 6, 2016). 
505 0 |a Front Cover; Threat Forecasting: Leveraging Big Data for Predictive Analysis; Copyright; Contents; About the Authors; Foreword; Why Threat Forecasting is Relevant; What You Will Learn and How You Will Benefit; Preface; Book Organization and Structure; Closing Thoughts; Acknowledgments; Chapter 1: Navigating Todays Threat Landscape; Introduction; Why Threat Forecasting; The Effects of a Data Breach; Barriers to Adopting Threat Forecasting Practices; Going Beyond Historical Threat Reporting; Timing; Generalization; The State of Regulatory Compliance; Industry Specific Guidelines. 
505 8 |a Healthcare InstitutionsFinancial Institutions; Cyber Security Information Sharing Legislation: Watch this Space; Best Practices, Standards, and Frameworks; PCI DSS; NIST Cyber Security Framework; Defense in Depth; Tier 1 Security Technologies; Tier 2 Security Technologies; Update and Evaluate Security Products and Technologies; Cyber Security and the Human Factor; Today's Information Assurance Needs; Chapter 2: Threat Forecasting; Synopsis; Introduction; Threat Forecasting; Dangers of Technology Sprawl; High Speed Big Data Collection and Surveillance; Threat Epidemiology. 
505 8 |a High Frequency Security AlgorithmsSummary; Chapter 3: Security Intelligence; Synopsis; Introduction; Security Intelligence; Information Vetting; KPIs; Programs; Scripts; Shortcuts; Other; Office Macros; Do It Yourself (DIY) Security Intelligence; Build; Buy; Partner; Key Indicator Attributes; Dissemination of Intelligence; Summary; Chapter 4: Identifying Knowledge Elements; Synopsis; Introduction; Defining Knowledge Elements; Intelligence Versus Information; A Quick Note About the Signal-to-Noise Ratio Metaphor; A Brief Note on IOCs and IOIs. 
505 8 |a Identifying Something Important Through the Use of IOAs, IOCs, and IOIsTypes of Knowledge Elements; IOA or Pre-attack Indicators; Indicators of Compromise; Indicators of Interest; Publicly Defined Knowledge Elements; OpenIOC; How It Works; How Do You Get It; Incident Object Description Exchange Format (RFC5070); IODEF Data Model; IODEF Implementation; IOCBucket.com; Cyber Observable eXpression; Summary; Chapter 5: Knowledge Sharing and Community Support; Synopsis; Introduction; Sharing Knowledge Elements; Advantages; Disadvantages; Community Sharing; VERIS; OpenIOC; TAXII; STIX; CybOX. 
505 8 |a Commercial OfferingsStaying Ahead of the Adversary; Summary; Chapter 6: Data Visualization; Synopsis; Introduction; Common Methods; Big Data Analytics; Interactive Visualization; Not Just For the Boardroom; Summary; Chapter 7: Data Simulation; Synopsis; Introduction; Traffic Simulation vs Emulation; Environmental; Flow; Data Sandboxes; Analytic Engines; Quantum Computing; Summary; Chapter 8: Kill Chain Modeling; Synopsis; Introduction; Key Components of Kill Chain Modeling; Leveraging Big Data; Tools Available; Maltego; Splunk; OpenGraphiti; Creation of Data Files; STIX; Kill Chains in STIX. 
520 |a This book discusses the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. 
504 |a Includes bibliographical references and index. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Big data. 
650 0 |a Forecasting. 
650 2 |a Forecasting 
650 2 |a Computer Security 
650 6 |a Prévision. 
650 6 |a Sécurité informatique. 
650 6 |a Données volumineuses. 
650 7 |a COMPUTERS  |x Security  |x Networking.  |2 bisacsh 
650 7 |a Forecasting  |2 fast 
650 7 |a Big data  |2 fast 
650 7 |a Computer security  |2 fast 
700 1 |a Pirc, John,  |e author. 
700 1 |a DeSanto, David,  |e author. 
700 1 |a Davison, Iain,  |e author. 
700 1 |a Gragido, Will,  |e author. 
776 0 8 |i Print version:  |a Pirc, John.  |t Threat Forecasting : Leveraging Big Data for Predictive Analysis.  |d Saint Louis : Elsevier Science, ©2016  |z 9780128000069 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780128004784/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Coutts Information Services  |b COUT  |n 34613531 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4529569 
938 |a EBSCOhost  |b EBSC  |n 1144055 
938 |a Gale Cengage Learning  |b GVRL  |n GVRL9JRX 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis34613531 
938 |a YBP Library Services  |b YANK  |n 13004530 
994 |a 92  |b IZTAP