Threat Forecasting

Leveraging Big Data for Predictive Analysis
 
 
Syngress (Verlag)
  • 1. Auflage
  • |
  • erschienen am 17. Mai 2016
  • |
  • 188 Seiten
 
E-Book | ePUB mit Adobe DRM | Systemvoraussetzungen
978-0-12-800478-4 (ISBN)
 

Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to reduce risk.


      • Presents case studies and actual data to demonstrate threat data visualization techniques and threat simulation tools
        • Explores the usage of kill chain modelling to inform actionable security intelligence
          • Demonstrates a methodology that can be used to create a full threat forecast analysis for enterprise networks of any size


          John Pirc has more than 19 years of experience in Security R&D, worldwide security product management, marketing, testing, forensics, consulting, and critical infrastructure architecting and deployment. Additionally, John is an advisor to HP's CISO on Cyber Security and lectured at the US Naval Post Graduate School.
          John extensive expertise in the Security field stems from past work experience with the US Intelligence Community, as Chief Technology Officer at CSG LTD, Product Manager at Cisco, Product Line Executive for all security products at IBM Internet Security Systems, Director at McAfee's Network Defense Business Unit, Director of Product Management at HP Enterprise Security Products, Chief Technology Officer at NSS Labs, Co-Founder and Chief Strategy Officer at Bricata, LLC and most recently as Director of Security Solutions for Forsythe Technology.
          In addition to a BBA from the University of Texas, John also holds the NSA-IAM and CEH certifications. He has been named security thought leader from SANS Institute and speaks at top tier security conferences worldwide and has been published in Time Magazine, Bloomberg, CNN and other tier 1 media outlets.
          • Englisch
          • Saint Louis
          • |
          • USA
          Elsevier Science
          • 6,49 MB
          978-0-12-800478-4 (9780128004784)
          0128004789 (0128004789)
          weitere Ausgaben werden ermittelt
          • Front Cover
          • Threat Forecasting: Leveraging Big Data for Predictive Analysis
          • Copyright
          • Contents
          • About the Authors
          • Foreword
          • Why Threat Forecasting is Relevant
          • What You Will Learn and How You Will Benefit
          • Preface
          • Book Organization and Structure
          • Closing Thoughts
          • Acknowledgments
          • Chapter 1: Navigating Todays Threat Landscape
          • Introduction
          • Why Threat Forecasting
          • The Effects of a Data Breach
          • Barriers to Adopting Threat Forecasting Practices
          • Going Beyond Historical Threat Reporting
          • Timing
          • Generalization
          • The State of Regulatory Compliance
          • Industry Specific Guidelines
          • Healthcare Institutions
          • Financial Institutions
          • Cyber Security Information Sharing Legislation: Watch this Space
          • Best Practices, Standards, and Frameworks
          • PCI DSS
          • NIST Cyber Security Framework
          • Defense in Depth
          • Tier 1 Security Technologies
          • Tier 2 Security Technologies
          • Update and Evaluate Security Products and Technologies
          • Cyber Security and the Human Factor
          • Today's Information Assurance Needs
          • Chapter 2: Threat Forecasting
          • Synopsis
          • Introduction
          • Threat Forecasting
          • Dangers of Technology Sprawl
          • High Speed Big Data Collection and Surveillance
          • Threat Epidemiology
          • High Frequency Security Algorithms
          • Summary
          • Chapter 3: Security Intelligence
          • Synopsis
          • Introduction
          • Security Intelligence
          • Information Vetting
          • KPIs
          • Programs
          • Scripts
          • Shortcuts
          • Other
          • Office Macros
          • Do It Yourself (DIY) Security Intelligence
          • Build
          • Buy
          • Partner
          • Key Indicator Attributes
          • Dissemination of Intelligence
          • Summary
          • Chapter 4: Identifying Knowledge Elements
          • Synopsis
          • Introduction
          • Defining Knowledge Elements
          • Intelligence Versus Information
          • A Quick Note About the Signal-to-Noise Ratio Metaphor
          • A Brief Note on IOCs and IOIs
          • Identifying Something Important Through the Use of IOAs, IOCs, and IOIs
          • Types of Knowledge Elements
          • IOA or Pre-attack Indicators
          • Indicators of Compromise
          • Indicators of Interest
          • Publicly Defined Knowledge Elements
          • OpenIOC
          • How It Works
          • How Do You Get It
          • Incident Object Description Exchange Format (RFC5070)
          • IODEF Data Model
          • IODEF Implementation
          • IOCBucket.com
          • Cyber Observable eXpression
          • Summary
          • Chapter 5: Knowledge Sharing and Community Support
          • Synopsis
          • Introduction
          • Sharing Knowledge Elements
          • Advantages
          • Disadvantages
          • Community Sharing
          • VERIS
          • OpenIOC
          • TAXII
          • STIX
          • CybOX
          • Commercial Offerings
          • Staying Ahead of the Adversary
          • Summary
          • Chapter 6: Data Visualization
          • Synopsis
          • Introduction
          • Common Methods
          • Big Data Analytics
          • Interactive Visualization
          • Not Just For the Boardroom
          • Summary
          • Chapter 7: Data Simulation
          • Synopsis
          • Introduction
          • Traffic Simulation vs Emulation
          • Environmental
          • Flow
          • Data Sandboxes
          • Analytic Engines
          • Quantum Computing
          • Summary
          • Chapter 8: Kill Chain Modeling
          • Synopsis
          • Introduction
          • Key Components of Kill Chain Modeling
          • Leveraging Big Data
          • Tools Available
          • Maltego
          • Splunk
          • OpenGraphiti
          • Creation of Data Files
          • STIX
          • Kill Chains in STIX
          • Defining A Kill Chain
          • Referencing A Kill Chain Phase
          • Summary
          • Chapter 9: Connecting the Dots
          • Synopsis
          • Introduction
          • Historical Threat Reporting
          • Value vs. Issues
          • Leveraging Historical Threat Reporting
          • Historical Threat Reporting vs. Threat Forecasting
          • State of the Security Industry
          • Security Products Deployed Today
          • Next Generation Firewalls
          • Intrusion Prevention Systems
          • Web Application Firewalls
          • Endpoint Security
          • Advanced Threat Detection
          • Product Effectiveness Issues
          • The Known vs. The Unknown
          • Leveraging New and Existing Tools
          • Open Source Solutions
          • Commercial Offerings
          • Real World Examples
          • Anthem Breach Revisited
          • Target Breach Revisited
          • Michaels and Staples Data Breach Analysis
          • Applying Threat Forecasting Techniques
          • Phase 1-Foundational Research/Review
          • Phase 2-Organizational Implementation/Pattern Analysis
          • Phase 3-Information Sharing/Share and Build
          • Summary
          • Chapter 10: The Road Ahead
          • Synopsis
          • John Pirc
          • David DeSanto
          • Iain Davison
          • Will Gragido
          • Summary
          • Index
          • Back Cover

          Dateiformat: EPUB
          Kopierschutz: Adobe-DRM (Digital Rights Management)

          Systemvoraussetzungen:

          Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

          Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

          E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

          Das Dateiformat EPUB ist sehr gut für Romane und Sachbücher geeignet - also für "fließenden" Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

          Weitere Informationen finden Sie in unserer E-Book Hilfe.


          Download (sofort verfügbar)

          51,11 €
          inkl. 19% MwSt.
          Download / Einzel-Lizenz
          ePUB mit Adobe DRM
          siehe Systemvoraussetzungen
          E-Book bestellen

          Unsere Web-Seiten verwenden Cookies. Mit der Nutzung dieser Web-Seiten erklären Sie sich damit einverstanden. Mehr Informationen finden Sie in unserem Datenschutzhinweis. Ok