Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Cambridge, MA : Syngress is an imprint of Elsevier
    ISBN: 9780128004784 , 0128004789 , 0128000066 , 9780128000069
    Language: English
    Pages: 1 online resource
    Parallel Title: Erscheint auch als
    DDC: 005.8
    RVK:
    Keywords: COMPUTERS / Security / Networking ; Big data ; Computer security ; Computer security ; Big data ; Computersicherheit ; Bedrohung ; Big Data ; Prognose ; Computersicherheit ; Big Data ; Bedrohung ; Prognose
    Abstract: This book discusses the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools
    Note: Includes index , Includes bibliographical references and index
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9780128004784 , 9780128000069
    Language: English
    Pages: 1 online resource (xxi, 166 pages)
    Parallel Title: Erscheint auch als Pirc, John Threat forecasting
    DDC: 303.49
    RVK:
    Keywords: Computer security ; Big data Security measures ; Forecasting ; Computer security. ; Big data Security measures. ; Forecasting ; Electronic books ; Big Data ; Computersicherheit
    Abstract: Front Cover -- Threat Forecasting: Leveraging Big Data for Predictive Analysis -- Copyright -- Contents -- About the Authors -- Foreword -- Why Threat Forecasting is Relevant -- What You Will Learn and How You Will Benefit -- Preface -- Book Organization and Structure -- Closing Thoughts -- Acknowledgments -- Chapter 1: Navigating Todays Threat Landscape -- Introduction -- Why Threat Forecasting -- The Effects of a Data Breach -- Barriers to Adopting Threat Forecasting Practices -- Going Beyond Historical Threat Reporting -- Timing -- Generalization -- The State of Regulatory Compliance -- Industry Specific Guidelines -- Healthcare Institutions -- Financial Institutions -- Cyber Security Information Sharing Legislation: Watch this Space -- Best Practices, Standards, and Frameworks -- PCI DSS -- NIST Cyber Security Framework -- Defense in Depth -- Tier 1 Security Technologies -- Tier 2 Security Technologies -- Update and Evaluate Security Products and Technologies -- Cyber Security and the Human Factor -- Today's Information Assurance Needs -- Chapter 2: Threat Forecasting -- Synopsis -- Introduction -- Threat Forecasting -- Dangers of Technology Sprawl -- High Speed Big Data Collection and Surveillance -- Threat Epidemiology -- High Frequency Security Algorithms -- Summary -- Chapter 3: Security Intelligence -- Synopsis -- Introduction -- Security Intelligence -- Information Vetting -- KPIs -- Programs -- Scripts -- Shortcuts -- Other -- Office Macros -- Do It Yourself (DIY) Security Intelligence -- Build -- Buy -- Partner -- Key Indicator Attributes -- Dissemination of Intelligence -- Summary -- Chapter 4: Identifying Knowledge Elements -- Synopsis -- Introduction -- Defining Knowledge Elements -- Intelligence Versus Information -- A Quick Note About the Signal-to-Noise Ratio Metaphor -- A Brief Note on IOCs and IOIs.
    Note: Includes bibliographical references and index , Zielgruppe - Audience: Specialized
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780128000069
    Language: English
    Pages: xxi, 166 Seiten , Illustrationen
    Parallel Title: Erscheint auch als Pirc, John Threat forecasting
    Parallel Title: Erscheint auch als Threat forecasting
    DDC: 005.8
    RVK:
    Keywords: Big Data ; Computersicherheit
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...