000 | 05554cam a2200589Ii 4500 | ||
---|---|---|---|
001 | ocn950518678 | ||
003 | OCoLC | ||
005 | 20190328114815.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 160525s2016 mau ob 001 0 eng d | ||
040 |
_aN$T _beng _erda _epn _cN$T _dIDEBK _dUIU _dEBLCP _dOPELS _dN$T _dCDX _dOCLCF _dYDXCP _dGGVRL _dDEBSZ _dUMI _dSTF _dIDB _dCOO _dVT2 _dMERUC _dOCLCQ _dOCLCO _dU3W _dOCLCA _dWRM _dCNCGM _dD6H _dOCLCQ _dUOK _dCEF _dKSU _dEZ9 _dOCLCQ _dDEBBG _dOCLCQ _dWYU _dUAB |
||
019 |
_a950689896 _a951221751 _a956735839 _a957614854 _a965800894 _a968121545 |
||
020 |
_a9780128004784 _q(electronic bk.) |
||
020 |
_a0128004789 _q(electronic bk.) |
||
020 | _a0128000066 | ||
020 | _a9780128000069 | ||
020 | _z9780128000069 | ||
024 | 3 | _a9780128000069 | |
035 |
_a(OCoLC)950518678 _z(OCoLC)950689896 _z(OCoLC)951221751 _z(OCoLC)956735839 _z(OCoLC)957614854 _z(OCoLC)965800894 _z(OCoLC)968121545 |
||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 0 | 0 |
_aThreat forecasting : leveraging big data for predictive analysis / _h[electronic resource] _cJohn Pirc, David DeSanto, Iain Davison, Will Gragido. |
264 | 1 |
_aCambridge, MA : _bSyngress is an imprint of Elsevier, _c2016. |
|
264 | 4 | _c�2016 | |
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
500 | _aIncludes index. | ||
588 | 0 | _aOnline resource; title from PDF title page (ScienceDirect, viewed June 6, 2016). | |
505 | 0 | _aFront Cover; Threat Forecasting: Leveraging Big Data for Predictive Analysis; Copyright; Contents; About the Authors; Foreword; Why Threat Forecasting is Relevant; What You Will Learn and How You Will Benefit; Preface; Book Organization and Structure; Closing Thoughts; Acknowledgments; Chapter 1: Navigating Todays Threat Landscape; Introduction; Why Threat Forecasting; The Effects of a Data Breach; Barriers to Adopting Threat Forecasting Practices; Going Beyond Historical Threat Reporting; Timing; Generalization; The State of Regulatory Compliance; Industry Specific Guidelines. | |
505 | 8 | _aHealthcare InstitutionsFinancial Institutions; Cyber Security Information Sharing Legislation: Watch this Space; Best Practices, Standards, and Frameworks; PCI DSS; NIST Cyber Security Framework; Defense in Depth; Tier 1 Security Technologies; Tier 2 Security Technologies; Update and Evaluate Security Products and Technologies; Cyber Security and the Human Factor; Today's Information Assurance Needs; Chapter 2: Threat Forecasting; Synopsis; Introduction; Threat Forecasting; Dangers of Technology Sprawl; High Speed Big Data Collection and Surveillance; Threat Epidemiology. | |
505 | 8 | _aHigh Frequency Security AlgorithmsSummary; Chapter 3: Security Intelligence; Synopsis; Introduction; Security Intelligence; Information Vetting; KPIs; Programs; Scripts; Shortcuts; Other; Office Macros; Do It Yourself (DIY) Security Intelligence; Build; Buy; Partner; Key Indicator Attributes; Dissemination of Intelligence; Summary; Chapter 4: Identifying Knowledge Elements; Synopsis; Introduction; Defining Knowledge Elements; Intelligence Versus Information; A Quick Note About the Signal-to-Noise Ratio Metaphor; A Brief Note on IOCs and IOIs. | |
505 | 8 | _aIdentifying Something Important Through the Use of IOAs, IOCs, and IOIsTypes of Knowledge Elements; IOA or Pre-attack Indicators; Indicators of Compromise; Indicators of Interest; Publicly Defined Knowledge Elements; OpenIOC; How It Works; How Do You Get It; Incident Object Description Exchange Format (RFC5070); IODEF Data Model; IODEF Implementation; IOCBucket.com; Cyber Observable eXpression; Summary; Chapter 5: Knowledge Sharing and Community Support; Synopsis; Introduction; Sharing Knowledge Elements; Advantages; Disadvantages; Community Sharing; VERIS; OpenIOC; TAXII; STIX; CybOX. | |
505 | 8 | _aCommercial OfferingsStaying Ahead of the Adversary; Summary; Chapter 6: Data Visualization; Synopsis; Introduction; Common Methods; Big Data Analytics; Interactive Visualization; Not Just For the Boardroom; Summary; Chapter 7: Data Simulation; Synopsis; Introduction; Traffic Simulation vs Emulation; Environmental; Flow; Data Sandboxes; Analytic Engines; Quantum Computing; Summary; Chapter 8: Kill Chain Modeling; Synopsis; Introduction; Key Components of Kill Chain Modeling; Leveraging Big Data; Tools Available; Maltego; Splunk; OpenGraphiti; Creation of Data Files; STIX; Kill Chains in STIX. | |
520 | _aThis book discusses the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. | ||
504 | _aIncludes bibliographical references and index. | ||
650 | 0 | _aComputer security. | |
650 | 0 | _aBig data. | |
650 | 7 |
_aCOMPUTERS _xSecurity _xNetworking. _2bisacsh |
|
650 | 7 |
_aBig data. _2fast _0(OCoLC)fst01892965 |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 |
|
655 | 4 | _aElectronic books. | |
700 | 1 |
_aPirc, John, _eauthor. |
|
700 | 1 |
_aDeSanto, David, _eauthor. |
|
700 | 1 |
_aDavison, Iain, _eauthor. |
|
700 | 1 |
_aGragido, Will, _eauthor. |
|
776 | 0 | 8 |
_iPrint version: _aPirc, John. _tThreat Forecasting : Leveraging Big Data for Predictive Analysis. _dSaint Louis : Elsevier Science, �2016 _z9780128000069 |
856 | 4 | 0 |
_3ScienceDirect _uhttp://www.sciencedirect.com/science/book/9780128000069 |
999 |
_c247341 _d247341 |