The NICE Cyber Security Framework by Izzat Alsmadi & Chuck Easttom & Lo’ai Tawalbeh
Author:Izzat Alsmadi & Chuck Easttom & Lo’ai Tawalbeh
Language: eng
Format: epub
ISBN: 9783030419875
Publisher: Springer International Publishing
The more modern and desirable approach though, would be using machine learning. Machine learning allows computers to process new conditions through analysis, self-training and observation [9]. This allows the machine to gain experience then use it for decision-making. Tools such as UEBA’s (User, Entity and Behavioral Analytics) incorporate machine learning and are gaining popularity in the industry to thwart attacks. UEBA’s discover security anomalies by aggregating data via logs and reports, packets, traffic flow, files, user accounts, endpoints and much more. This information is compared to other threat data to help train the model and determine what’s normal through repetition thus building a better security. This allows organizations to better understand what their users are doing daily and establish a baseline for network activity [10].
The machine will create its own rules and formulate opinions based what it learns then provide stats and metrics saving personnel from having to do the heavy lifting by performing hours of log sifting [11]. Those are manual processes and history has taught the industry that humans are error prone. Through automation, efficiency is gained, errors are reduced, and repeatability is achieved. Table 6.1 shows how these technologies may be combined to provide a layered defense in an organization. Almost every if not all security course teaches the “defense in depth” methodology and while this chart is not conclusive, it provides an idea of how these tools can be cross-functional in design and application.Table 6.1Layered defense in an organization
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7790)
Grails in Action by Glen Smith Peter Ledbrook(7705)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6648)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6637)
Running Windows Containers on AWS by Marcio Morales(6162)
Kotlin in Action by Dmitry Jemerov(5074)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4960)
Combating Crime on the Dark Web by Nearchos Nearchou(4547)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4424)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4422)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4212)
The Age of Surveillance Capitalism by Shoshana Zuboff(3964)
Python for Security and Networking - Third Edition by José Manuel Ortega(3784)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3515)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3451)
Mastering Python for Networking and Security by José Manuel Ortega(3359)
Learn Wireshark by Lisa Bock(3344)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3308)
