Preemptive Security Through Information Analytics

被引:0
|
作者
Early, Gregory [1 ]
Stott, William, III [1 ]
机构
[1] Raytheon Missile Syst, 3360 E Hemisphere Loop,Bldg M10, Tucson, AZ 85706 USA
来源
INFORMATION SECURITY JOURNAL | 2015年 / 24卷 / 1-3期
关键词
data attribute correlation; data scientist; innocuous security data fusion; predictive big data analytics; security information analytics;
D O I
10.1080/19393555.2015.1042600
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Business security and threat actors continue to play a dangerous cat-and-mouse game with businesses intellectual property, customer data, and business reputations at stake. Businesses need to delve into a new way of doing business security to break out of this game. Businesses are sitting on repositories full of security-relevant data that is not being capitalized upon with the current information security and physical security organizations within businesses. This article poses the introduction of a data scientist role and a new supporting central data correlation technology platform based on big data predictive analytics into business security functions. The goal is to intelligently and autonomously identify, correlate and pinpoint normally innocuous or unnoticed security event attributes to allow security personnel to preemptively remediate physical and information risks before exploitation or loss of intellectual property occurs.
引用
收藏
页码:48 / 56
页数:9
相关论文
共 50 条
  • [1] Big Data Analytics for Information Security
    Szczypiorski, Krzysztof
    Wang, Liqiang
    Luo, Xiangyang
    Ye, Dengpan
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [2] Integrated Education of Data Analytics and Information Security through Cross-Curricular Activities
    Luo, Xiao
    Justice, Connie
    Sorge, Brandon Herald
    2019 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE 2019), 2019,
  • [3] Promoting Food Security Through Improved Analytics
    Gounden, Colin
    Irvine, John M.
    Wood, Richard J.
    HUMANITARIAN TECHNOLOGY: SCIENCE, SYSTEMS AND GLOBAL IMPACT 2015, HUMTECH2015, 2015, 107 : 335 - 336
  • [4] Improved Security through Information Security Governance
    Johnston, Allen C.
    Hale, Ron
    COMMUNICATIONS OF THE ACM, 2009, 52 (01) : 126 - 129
  • [5] Towards Visual Analytics Tasks for the Security Information and Event Management
    Novikova, Evgenia S.
    Bekeneva, Yana A.
    Shorov, Andrey V.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 90 - 93
  • [6] Towards Industrial Security Through Real-time Analytics
    Dangal, Prajjwal
    Bloom, Gedare
    2020 IEEE 23RD INTERNATIONAL SYMPOSIUM ON REAL-TIME DISTRIBUTED COMPUTING (ISORC 2020), 2020, : 156 - 157
  • [7] Toward Global Food Security: Transforming OCP Through Analytics
    Becker, Adrian
    Benabderrazik, Kassem
    Bertsimas, Dimitris
    Chtinna, Nada
    El Majdoub, Nada
    Mahboubi, El Miloudi
    Kitane, Driss Lahlou
    Kokkotos, Steve
    Mourtzinou, Georgia
    Rakhis, Ilyas
    INFORMS JOURNAL ON APPLIED ANALYTICS, 2022, 52 (01): : 90 - 107
  • [8] SIEMA: Bringing Advanced Analytics to Legacy Security Information and Event Management
    Najafi, Pejman
    Cheng, Feng
    Meinel, Christoph
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT I, 2021, 398 : 25 - 43
  • [9] SAVIOR Security Analytics on Asset Vulnerability for Information Abstraction and Risk Analysis
    Flanagan, Kieran
    Fallon, Enda
    Awad, Abir
    Connolly, Paul
    2016 UKSIM-AMSS 18TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM), 2016, : 9 - 15
  • [10] WebTheme™:: Understanding Web information through visual analytics
    Whiting, MA
    Cramer, N
    SEMANTIC WEB - ISWC 2002, 2002, 2342 : 460 - 468