The NICE Cyber Security Framework by Izzat Alsmadi & Chuck Easttom & Lo’ai Tawalbeh
Author:Izzat Alsmadi & Chuck Easttom & Lo’ai Tawalbeh
Language: eng
Format: epub
ISBN: 9783030419875
Publisher: Springer International Publishing
The more modern and desirable approach though, would be using machine learning. Machine learning allows computers to process new conditions through analysis, self-training and observation [9]. This allows the machine to gain experience then use it for decision-making. Tools such as UEBA’s (User, Entity and Behavioral Analytics) incorporate machine learning and are gaining popularity in the industry to thwart attacks. UEBA’s discover security anomalies by aggregating data via logs and reports, packets, traffic flow, files, user accounts, endpoints and much more. This information is compared to other threat data to help train the model and determine what’s normal through repetition thus building a better security. This allows organizations to better understand what their users are doing daily and establish a baseline for network activity [10].
The machine will create its own rules and formulate opinions based what it learns then provide stats and metrics saving personnel from having to do the heavy lifting by performing hours of log sifting [11]. Those are manual processes and history has taught the industry that humans are error prone. Through automation, efficiency is gained, errors are reduced, and repeatability is achieved. Table 6.1 shows how these technologies may be combined to provide a layered defense in an organization. Almost every if not all security course teaches the “defense in depth” methodology and while this chart is not conclusive, it provides an idea of how these tools can be cross-functional in design and application.Table 6.1Layered defense in an organization
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7402)
Grails in Action by Glen Smith Peter Ledbrook(7296)
Kotlin in Action by Dmitry Jemerov(4638)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4131)
The Age of Surveillance Capitalism by Shoshana Zuboff(3423)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3243)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3029)
Mastering Python for Networking and Security by José Manuel Ortega(2952)
Blockchain Basics by Daniel Drescher(2891)
TCP IP by Todd Lammle(2641)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(2612)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2483)
Hands-On Azure for Developers by Kamil Mrzyglod(2412)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(2374)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(2340)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2313)
The Social Psychology of Inequality by Unknown(2311)
The Art Of Deception by Kevin Mitnick(2299)
Azure Containers Explained by Wesley Haakman & Richard Hooper(2267)