Preemptive Security Through Information Analytics

被引:0
|
作者
Early, Gregory [1 ]
Stott, William, III [1 ]
机构
[1] Raytheon Missile Syst, 3360 E Hemisphere Loop,Bldg M10, Tucson, AZ 85706 USA
来源
INFORMATION SECURITY JOURNAL | 2015年 / 24卷 / 1-3期
关键词
data attribute correlation; data scientist; innocuous security data fusion; predictive big data analytics; security information analytics;
D O I
10.1080/19393555.2015.1042600
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Business security and threat actors continue to play a dangerous cat-and-mouse game with businesses intellectual property, customer data, and business reputations at stake. Businesses need to delve into a new way of doing business security to break out of this game. Businesses are sitting on repositories full of security-relevant data that is not being capitalized upon with the current information security and physical security organizations within businesses. This article poses the introduction of a data scientist role and a new supporting central data correlation technology platform based on big data predictive analytics into business security functions. The goal is to intelligently and autonomously identify, correlate and pinpoint normally innocuous or unnoticed security event attributes to allow security personnel to preemptively remediate physical and information risks before exploitation or loss of intellectual property occurs.
引用
收藏
页码:48 / 56
页数:9
相关论文
共 50 条
  • [31] Visual Analytics for Network Security
    Shurkhovetskyy, Georgiy
    Bahey, Ahmed
    Ghoniem, Mohammad
    2012 IEEE CONFERENCE ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY (VAST), 2012, : 301 - 302
  • [32] Security and Privacy in Social Analytics
    Wen, Zhen
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON SOCIAL INFLUENCE ANALYSIS (SOCINF 2015), 2015, 1398
  • [33] Supporting students' knowledge and skills in information technology security through a security portal
    Ciftci, Nilay Pancar
    Delialioglu, Omer
    INFORMATION DEVELOPMENT, 2016, 32 (05) : 1417 - 1427
  • [34] Big Data Analytics for Security
    Cardenas, Alvaro A.
    Manadhata, Pratyusa K.
    Rajan, Sreeranga P.
    IEEE SECURITY & PRIVACY, 2013, 11 (06) : 74 - 76
  • [35] Tutorial: Text Analytics for Security
    Xie, Tao
    Enck, William
    SYMPOSIUM AND BOOTCAMP ON THE SCIENCE OF SECURITY, 2016, : 124 - 125
  • [36] Tutorial: Text Analytics for Security
    Enck, William
    Xie, Tao
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1540 - 1541
  • [37] The Bush national security strategy of preemptive war
    Cook, ML
    War and Border Crossing: Ethics When Cultures Clash, 2005, : 19 - 23
  • [38] Internalisation of information security culture amongst employees through basic security knowledge
    Zakaria, Omar
    Security and Privacy in Dynamic Environments, 2006, 201 : 437 - 441
  • [40] Information security through controlled quantum teleportation networks
    Hala Hamdoun
    Alaa Sagheer
    Digital Communications and Networks, 2020, 6 (04) : 463 - 470