Narrow your search
Listing 1 - 5 of 5
Sort by

Book
Threat forecasting : leveraging big data for predictive analysis
Author:
ISBN: 0128004789 0128000066 9780128004784 9780128000069 9780128000069 Year: 2016 Publisher: Cambridge, MA : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to reduce risk. Presents case studies and actual data to demonstrate threat data visualization techniques and threat simulation tools Explores the usage of kill chain modelling to inform actionable security intelligence Demonstrates a methodology that can be used to create a full threat forecast analysis for enterprise networks of any size


Book
Cybercrime and espionage
Authors: ---
ISBN: 9781597496131 1597496138 9781597496148 1597496146 Year: 2011 Publisher: Rockland, Mass. Oxford Syngress Elsevier Science [distributor]

Loading...
Export citation

Choose an application

Bookmark

Abstract


Multi
Cybercrime and espionage : an analysis of subversive multi-vector threats
Authors: ---
ISBN: 9781597496131 1597496138 9781597496148 1597496146 Year: 2011 Publisher: Oxford Elsevier Science [distributor]

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed "Subversive Multi-Vector Threats" or 'SMT's. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace. Includes detailed analysis and examples of the threats in addition to related anecdotal information Author's combined backgrounds of security, military, and intelligence, give you distinct and timely insights Present never before published information: identification and analysis of cybercrime and the psychological profiles that accompany them.


Book
Cybercrime and espionage : an analysis of subversive multivector threats
Authors: --- ---
ISBN: 1282967479 9786612967474 1597496146 1597496138 Year: 2011 Publisher: Amsterdam : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed "Subversive Multi-Vector Threats? or 'SMT's. Whether the goal is to acquire and subsequently sell intellectual property from


Digital
Threat forecasting : leveraging big data for predictive analysis
Authors: --- --- ---
ISBN: 9780128004784 0128004789 0128000066 9780128000069 Year: 2016 Publisher: Cambridge, MA Syngress is an imprint of Elsevier

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book discusses the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools.

Listing 1 - 5 of 5
Sort by