Preemptive Security Through Information Analytics

被引:0
|
作者
Early, Gregory [1 ]
Stott, William, III [1 ]
机构
[1] Raytheon Missile Syst, 3360 E Hemisphere Loop,Bldg M10, Tucson, AZ 85706 USA
来源
INFORMATION SECURITY JOURNAL | 2015年 / 24卷 / 1-3期
关键词
data attribute correlation; data scientist; innocuous security data fusion; predictive big data analytics; security information analytics;
D O I
10.1080/19393555.2015.1042600
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Business security and threat actors continue to play a dangerous cat-and-mouse game with businesses intellectual property, customer data, and business reputations at stake. Businesses need to delve into a new way of doing business security to break out of this game. Businesses are sitting on repositories full of security-relevant data that is not being capitalized upon with the current information security and physical security organizations within businesses. This article poses the introduction of a data scientist role and a new supporting central data correlation technology platform based on big data predictive analytics into business security functions. The goal is to intelligently and autonomously identify, correlate and pinpoint normally innocuous or unnoticed security event attributes to allow security personnel to preemptively remediate physical and information risks before exploitation or loss of intellectual property occurs.
引用
收藏
页码:48 / 56
页数:9
相关论文
共 50 条
  • [21] The collective security dilemma of preemptive strikes
    Konrad, Kai A.
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2024, 313 (03) : 1191 - 1199
  • [22] Reducing fraud in organizations through information security policy compliance: An information security controls perspective
    Brown, Dennis
    Batra, Gunjan
    Zafar, Humayun
    Saeed, Khawaja
    COMPUTERS & SECURITY, 2024, 144
  • [23] Leadership of Information Security Managers on the Effectiveness of Information Systems Security Through Mediate of Organizational Culture
    Choi, Myeonggil
    Song, Jeongsuk
    ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURETECH & MUE, 2016, 393 : 649 - 654
  • [24] WIFI Security Certification Through Device Information
    Liu Tao
    Wen Yudong
    2018 INTERNATIONAL CONFERENCE ON SENSOR NETWORKS AND SIGNAL PROCESSING (SNSP 2018), 2018, : 302 - 305
  • [25] Reputation Risks through Information Security Incidents
    Eduardovich, Dorokhov Vitaliy
    Vladimirovich, Yankevskiy Alexey
    PROCEEDINGS OF THE 2016 IEEE NORTH WEST RUSSIA SECTION YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING CONFERENCE (ELCONRUSNW), 2016, : 194 - 198
  • [26] VaultBox: Enhancing the Security and Effectiveness of Security Analytics
    Trivedi, Devharsh
    Triandopoulos, Nikos
    SCIENCE OF CYBER SECURITY, SCISEC 2023, 2023, 14299 : 401 - 422
  • [27] Unveiling Ideological Trends Through Data Analytics to Construe National Security Instabilities
    Cardenas, Pedro
    Obara, Boguslaw
    Theodoropoulos, Georgios
    Kureshi, Ibad
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 4308 - 4317
  • [28] Countering Advanced Persistent Threats through Security Intelligence and Big Data Analytics
    Marchetti, Mirco
    Pierazzi, Fabio
    Guido, Alessandro
    Colajanni, Michele
    2017 INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON U.S.): PROCEEDINGS : 7-8 NOVEMBER 2017, WASHINGTON, DC, USA, 2016, : 243 - 261
  • [29] Fighting Botnets with Cyber-Security Analytics Dealing with heterogeneous cyber-security information in new generation SIEMs
    Gallego-Nicasio Crespo, Beatriz
    Garwood, Alan
    2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 192 - 198
  • [30] CORPORATE DIVIDEND POLICY AND PREEMPTIVE SECURITY ISSUES
    WEST, RR
    BIERMAN, H
    JOURNAL OF BUSINESS, 1968, 41 (01): : 71 - 75