Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    ISBN: 9780128004784 , 9780128000069
    Language: English
    Pages: 1 online resource (xxi, 166 pages)
    Parallel Title: Erscheint auch als Pirc, John Threat forecasting
    DDC: 303.49
    RVK:
    Keywords: Computer security ; Big data Security measures ; Forecasting ; Computer security. ; Big data Security measures. ; Forecasting ; Electronic books ; Big Data ; Computersicherheit
    Abstract: Front Cover -- Threat Forecasting: Leveraging Big Data for Predictive Analysis -- Copyright -- Contents -- About the Authors -- Foreword -- Why Threat Forecasting is Relevant -- What You Will Learn and How You Will Benefit -- Preface -- Book Organization and Structure -- Closing Thoughts -- Acknowledgments -- Chapter 1: Navigating Todays Threat Landscape -- Introduction -- Why Threat Forecasting -- The Effects of a Data Breach -- Barriers to Adopting Threat Forecasting Practices -- Going Beyond Historical Threat Reporting -- Timing -- Generalization -- The State of Regulatory Compliance -- Industry Specific Guidelines -- Healthcare Institutions -- Financial Institutions -- Cyber Security Information Sharing Legislation: Watch this Space -- Best Practices, Standards, and Frameworks -- PCI DSS -- NIST Cyber Security Framework -- Defense in Depth -- Tier 1 Security Technologies -- Tier 2 Security Technologies -- Update and Evaluate Security Products and Technologies -- Cyber Security and the Human Factor -- Today's Information Assurance Needs -- Chapter 2: Threat Forecasting -- Synopsis -- Introduction -- Threat Forecasting -- Dangers of Technology Sprawl -- High Speed Big Data Collection and Surveillance -- Threat Epidemiology -- High Frequency Security Algorithms -- Summary -- Chapter 3: Security Intelligence -- Synopsis -- Introduction -- Security Intelligence -- Information Vetting -- KPIs -- Programs -- Scripts -- Shortcuts -- Other -- Office Macros -- Do It Yourself (DIY) Security Intelligence -- Build -- Buy -- Partner -- Key Indicator Attributes -- Dissemination of Intelligence -- Summary -- Chapter 4: Identifying Knowledge Elements -- Synopsis -- Introduction -- Defining Knowledge Elements -- Intelligence Versus Information -- A Quick Note About the Signal-to-Noise Ratio Metaphor -- A Brief Note on IOCs and IOIs.
    Note: Includes bibliographical references and index , Zielgruppe - Audience: Specialized
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...