000 05554cam a2200589Ii 4500
001 ocn950518678
003 OCoLC
005 20190328114815.0
006 m o d
007 cr cnu|||unuuu
008 160525s2016 mau ob 001 0 eng d
040 _aN$T
_beng
_erda
_epn
_cN$T
_dIDEBK
_dUIU
_dEBLCP
_dOPELS
_dN$T
_dCDX
_dOCLCF
_dYDXCP
_dGGVRL
_dDEBSZ
_dUMI
_dSTF
_dIDB
_dCOO
_dVT2
_dMERUC
_dOCLCQ
_dOCLCO
_dU3W
_dOCLCA
_dWRM
_dCNCGM
_dD6H
_dOCLCQ
_dUOK
_dCEF
_dKSU
_dEZ9
_dOCLCQ
_dDEBBG
_dOCLCQ
_dWYU
_dUAB
019 _a950689896
_a951221751
_a956735839
_a957614854
_a965800894
_a968121545
020 _a9780128004784
_q(electronic bk.)
020 _a0128004789
_q(electronic bk.)
020 _a0128000066
020 _a9780128000069
020 _z9780128000069
024 3 _a9780128000069
035 _a(OCoLC)950518678
_z(OCoLC)950689896
_z(OCoLC)951221751
_z(OCoLC)956735839
_z(OCoLC)957614854
_z(OCoLC)965800894
_z(OCoLC)968121545
050 4 _aQA76.9.A25
072 7 _aCOM
_x043050
_2bisacsh
082 0 4 _a005.8
_223
245 0 0 _aThreat forecasting : leveraging big data for predictive analysis /
_h[electronic resource]
_cJohn Pirc, David DeSanto, Iain Davison, Will Gragido.
264 1 _aCambridge, MA :
_bSyngress is an imprint of Elsevier,
_c2016.
264 4 _c�2016
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
500 _aIncludes index.
588 0 _aOnline resource; title from PDF title page (ScienceDirect, viewed June 6, 2016).
505 0 _aFront Cover; Threat Forecasting: Leveraging Big Data for Predictive Analysis; Copyright; Contents; About the Authors; Foreword; Why Threat Forecasting is Relevant; What You Will Learn and How You Will Benefit; Preface; Book Organization and Structure; Closing Thoughts; Acknowledgments; Chapter 1: Navigating Todays Threat Landscape; Introduction; Why Threat Forecasting; The Effects of a Data Breach; Barriers to Adopting Threat Forecasting Practices; Going Beyond Historical Threat Reporting; Timing; Generalization; The State of Regulatory Compliance; Industry Specific Guidelines.
505 8 _aHealthcare InstitutionsFinancial Institutions; Cyber Security Information Sharing Legislation: Watch this Space; Best Practices, Standards, and Frameworks; PCI DSS; NIST Cyber Security Framework; Defense in Depth; Tier 1 Security Technologies; Tier 2 Security Technologies; Update and Evaluate Security Products and Technologies; Cyber Security and the Human Factor; Today's Information Assurance Needs; Chapter 2: Threat Forecasting; Synopsis; Introduction; Threat Forecasting; Dangers of Technology Sprawl; High Speed Big Data Collection and Surveillance; Threat Epidemiology.
505 8 _aHigh Frequency Security AlgorithmsSummary; Chapter 3: Security Intelligence; Synopsis; Introduction; Security Intelligence; Information Vetting; KPIs; Programs; Scripts; Shortcuts; Other; Office Macros; Do It Yourself (DIY) Security Intelligence; Build; Buy; Partner; Key Indicator Attributes; Dissemination of Intelligence; Summary; Chapter 4: Identifying Knowledge Elements; Synopsis; Introduction; Defining Knowledge Elements; Intelligence Versus Information; A Quick Note About the Signal-to-Noise Ratio Metaphor; A Brief Note on IOCs and IOIs.
505 8 _aIdentifying Something Important Through the Use of IOAs, IOCs, and IOIsTypes of Knowledge Elements; IOA or Pre-attack Indicators; Indicators of Compromise; Indicators of Interest; Publicly Defined Knowledge Elements; OpenIOC; How It Works; How Do You Get It; Incident Object Description Exchange Format (RFC5070); IODEF Data Model; IODEF Implementation; IOCBucket.com; Cyber Observable eXpression; Summary; Chapter 5: Knowledge Sharing and Community Support; Synopsis; Introduction; Sharing Knowledge Elements; Advantages; Disadvantages; Community Sharing; VERIS; OpenIOC; TAXII; STIX; CybOX.
505 8 _aCommercial OfferingsStaying Ahead of the Adversary; Summary; Chapter 6: Data Visualization; Synopsis; Introduction; Common Methods; Big Data Analytics; Interactive Visualization; Not Just For the Boardroom; Summary; Chapter 7: Data Simulation; Synopsis; Introduction; Traffic Simulation vs Emulation; Environmental; Flow; Data Sandboxes; Analytic Engines; Quantum Computing; Summary; Chapter 8: Kill Chain Modeling; Synopsis; Introduction; Key Components of Kill Chain Modeling; Leveraging Big Data; Tools Available; Maltego; Splunk; OpenGraphiti; Creation of Data Files; STIX; Kill Chains in STIX.
520 _aThis book discusses the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools.
504 _aIncludes bibliographical references and index.
650 0 _aComputer security.
650 0 _aBig data.
650 7 _aCOMPUTERS
_xSecurity
_xNetworking.
_2bisacsh
650 7 _aBig data.
_2fast
_0(OCoLC)fst01892965
650 7 _aComputer security.
_2fast
_0(OCoLC)fst00872484
655 4 _aElectronic books.
700 1 _aPirc, John,
_eauthor.
700 1 _aDeSanto, David,
_eauthor.
700 1 _aDavison, Iain,
_eauthor.
700 1 _aGragido, Will,
_eauthor.
776 0 8 _iPrint version:
_aPirc, John.
_tThreat Forecasting : Leveraging Big Data for Predictive Analysis.
_dSaint Louis : Elsevier Science, �2016
_z9780128000069
856 4 0 _3ScienceDirect
_uhttp://www.sciencedirect.com/science/book/9780128000069
999 _c247341
_d247341