Preemptive Security Through Information Analytics

被引:0
|
作者
Early, Gregory [1 ]
Stott, William, III [1 ]
机构
[1] Raytheon Missile Syst, 3360 E Hemisphere Loop,Bldg M10, Tucson, AZ 85706 USA
来源
INFORMATION SECURITY JOURNAL | 2015年 / 24卷 / 1-3期
关键词
data attribute correlation; data scientist; innocuous security data fusion; predictive big data analytics; security information analytics;
D O I
10.1080/19393555.2015.1042600
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Business security and threat actors continue to play a dangerous cat-and-mouse game with businesses intellectual property, customer data, and business reputations at stake. Businesses need to delve into a new way of doing business security to break out of this game. Businesses are sitting on repositories full of security-relevant data that is not being capitalized upon with the current information security and physical security organizations within businesses. This article poses the introduction of a data scientist role and a new supporting central data correlation technology platform based on big data predictive analytics into business security functions. The goal is to intelligently and autonomously identify, correlate and pinpoint normally innocuous or unnoticed security event attributes to allow security personnel to preemptively remediate physical and information risks before exploitation or loss of intellectual property occurs.
引用
收藏
页码:48 / 56
页数:9
相关论文
共 50 条
  • [11] Security through Information Risk Management
    Johnson, M. Eric
    Goetz, Eric
    Pfleeger, Shari Lawrence
    IEEE SECURITY & PRIVACY, 2009, 7 (03) : 45 - 52
  • [12] Information security management through measurement
    Von Solms, E
    Von Solms, SH
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 59 - 68
  • [13] Peace Building and Security Through Information
    Marelli, Francesco
    ASSESSING THE LEGACY OF THE ICTY, 2011, : 41 - 42
  • [14] The establishment of collaboration in managing information security through multisourcingThe establishment of collaboration in managing information security through multisourcing
    Naicker, V.
    Mafaiti, M.
    COMPUTERS & SECURITY, 2019, 80 : 224 - 237
  • [15] Preemptive strikes - A reality in security policy
    Kamp, KH
    INTERNATIONALE POLITIK, 2004, 59 (06): : 42 - 47
  • [16] Advanced Security Analytics
    Khatravath, Sreevidya
    Laha, Sumanta
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 461 - 464
  • [17] Security Analytics and Measurements
    Cybenko, George
    Landwehr, Carl E.
    IEEE SECURITY & PRIVACY, 2012, 10 (03) : 5 - 8
  • [18] Integration of Information Systems for Predictive Workforce Analytics: Models, Synergy, Security of Entrepreneurship
    Chornous, Galyna O.
    Gura, Viktoriya L.
    EUROPEAN JOURNAL OF SUSTAINABLE DEVELOPMENT, 2020, 9 (01): : 83 - 98
  • [19] Security Analytics: Big Data Analytics for Cybersecurity
    Mahmood, Tariq
    Afzal, Uzma
    2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA), 2013, : 129 - 134
  • [20] Entropy-Based Security Analytics: Measurements from a Critical Information System
    Cinque, Marcello
    Della Corte, Raffaele
    Pecchia, Antonio
    2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2017, : 379 - 390