Language : English
Published : 2017-10-01
Pages : 336
Big Data Analytics in Cybersecurity and IT Management
The power of big data in cybersecurity — Big data analytics for network forensics — Dynamic analytics-driven assessment of vulnerabilities and exploitation — Big data analytics for mobile app security — Machine unlearning: repairing learning models in adversarial — Environments — Cybersecurity training — Machine unlearning: repairing learning models in adversarial environments — Big data analytics for mobile app security — Security, privacy and trust in cloud computing: challenges and solutions — Cybersecurity in internet of things (IOT) — Data visualization for cyber security — Analyzing deviant socio-technical behaviors using social network analysis and cyber forensics-based methodologies — Security tools — Data and research initiatives for cybersecurity analysis
Out of stock
A clear, actionable blueprint for securing the vital information and IT services of global organizations of all sizes Information Assurance Handbook provides an overall strategy for safeguarding your organization’s critical data. The book presents a body of knowledge and outlines the steps necessary for senior management to effectively work with risk and learn to strategically, systematically, and economically plan for security challenges. You’ll learn how to implement technology, practices, and processes to mitigate and manage risk over time and also how to prevent, detect, contain, and recover from security breaches. The professional practices outlined are essential knowledge for effective security and risk management. Reveals how to predict known–and yet unknown–security risks Invaluable best practices technically vetted by a panel of global security leaders Outlines privacy law and critical standards and practices required to make strategic choices about compliance, risk acceptance, and performance Explains the critical differences between assets, threats, vulnerabilities, and controls to achieve effective decision-making for risk management throughout all levels of the organization.
About the Author
Corey Schou, Ph.D., is a fellow and vice chairperson of (ISC)2, the University Professor of Informatics and professor of computer science at Idaho State University, and the director of the Informatics Research Institute and the National Information Assurance Training and Education Center (NIATEC). Steven Hernandez, MBA, CISSP, is the chief information security officer for the Office of Inspector General at the U.S. Department of Health and Human Services (HHS).
GUIDE TO NETWORKING ESSENTIALS provides students with both the knowledge and hands-on skills necessary to work with network operating systems in a network administration environment. By focusing on troubleshooting and computer networking technologies, this book offers a comprehensive introduction to networking and to advances in software, wireless and network security. Challenge Labs and Hands-On Projects are directly integrated in each chapter to allow for a hands-on experience in the classroom. Updated content reflects the latest networking technologies and operating systems including new Ethernet standards, cloud computing, Windows 10, Windows Server 2016, and recent Linux distributions.
About the Author
Greg Tomsho is director of the Computer Networking Technology Department and Cisco Academy at Yavapai College in Prescott, Ariz. He has earned the CCNA, MCTS, MCSA, A , Security and Linux certifications. A former software engineer, technical support manager and IT director, he has more than 30 years of computer and networking experience. His other books include MCTS GUIDE TO WINDOWS SERVER 2008 ACTIVE DIRECTORY CONFIGURATION, MCTS GUIDE TO MICROSOFT WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE CONFIGURATION, GUIDE TO NETWORKING ESSENTIALS, GUIDE TO NETWORK SUPPORT AND TROUBLESHOOTING and A COURSEPREP EXAMGUIDE.
Everything in the book will have practical application for information security professionals. The entire purpose of data analysis and visualization is to gather feedback from the environment to make better and more informed technology decisions. Within information security that means identifying ways to prevent or detect breaches and then measuring the effectiveness in doing so, which is all wrapped up under “risk management.” All of the examples will be directed at answering real-world questions. One of the key points is not just to analyze what is in front of us, but collect and analyze the data we need to answer the questions that will lead to better decisions and prevention of hacks and vulnerabilities.
The book will present the core elements of analyzing I.T. system data and information security feedback by using 30 use cases and domain-specific data sets with a focus on practical “how-to.” This hands-on approach will be covered in context and will not be limited to just the analysis, but all the supporting skills needed to learn from our data. Data analysis from start to finish: from the data collection and preparation through the data storage and management fundamentals then into the analysis and finally data visualization and communication techniques all in the context of security.Use cases will include: Discovering anomalous firewall trafficHow to acquire and prepare security dataCreating a repeatable data analysis toolkit and workflowWhitehat stats reportSecurity event correlationVulnerability countsUsing inferential stats to detect malware outbreaksVisualizing system logsMapping BotnetsUsing NLP and Data Loss PreventionPredicting rogue behaviorHow to perform predictive analytics.
About the Author
Jay Jacobs is the coauthor of Verizon Data Breach Investigation Reports and the cofounder of the Society of Information Risk Analysts, where he currently sits on the board of directors. Bob Rudis is the Director of Enterprise Information Security & IT Risk Management at Liberty Mutual Insurance and was named one of the Top 25 Influencers in Information Security by Tripwire .
About the Author
WADE ALCORN is the creator of the BeEF open source browser exploitation framework, among toolswatch.orgs top 10 security tools. CHRISTIAN FRICHOT is a lead developer of BeEF, as well as a leader of the Perth Open Web Application Security Project. MICHELE ORR is the lead core developer of BeEF, as well as a vulnerability researcher and social engineer.