Fr. 65.00

Data-Driven Security - Analysis, Visualization and Dashboards

English · Paperback / Softback

Delivery time undetermined

Description

Read more

Uncover hidden patterns of data and respond with countermeasures
 
Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful - data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and make better decisions.
 
Everything in this book will have practical application for information security professionals.
* Helps IT and security professionals understand and use data, so they can thwart attacks and understand and visualize vulnerabilities in their networks
* Includes more than a dozen real-world examples and hands-on exercises that demonstrate how to analyze security data and intelligence and translate that information into visualizations that make plain how to prevent attacks
* Covers topics such as how to acquire and prepare security data, use simple statistical methods to detect malware, predict rogue behavior, correlate security events, and more
* Written by a team of well-known experts in the field of security and data analysis
 
Lock down your networks, prevent hacks, and thwart malware by improving visibility into the environment, all through the power of data and Security Using Data Analysis, Visualization, and Dashboards.

List of contents

Introduction xv
 
Chapter 1 * The Journey to Data-Driven Security 1
 
A Brief History of Learning from Data 2
 
Nineteenth Century Data Analysis 2
 
Twentieth Century Data Analysis 3
 
Twenty-First Century Data Analysis 4
 
Gathering Data Analysis Skills 5
 
Domain Expertise 6
 
Programming Skills 8
 
Data Management 10
 
Statistics 12
 
Visualization (aka Communication) 14
 
Combining the Skills 15
 
Centering on a Question 16
 
Creating a Good Research Question 17
 
Exploratory Data Analysis 18
 
Summary 18
 
Recommended Reading 19
 
Chapter 2 * Building Your Analytics Toolbox: A Primer on Using R and Python for Security Analysis 21
 
Why Python? Why R? And Why Both? 22
 
Why Python? 23
 
Why R? 23
 
Why Both? 24
 
Jumpstarting Your Python Analytics with Canopy 24
 
Understanding the Python Data Analysis and Visualization Ecosystem 25
 
Setting Up Your R Environment 29
 
Introducing Data Frames 33
 
Organizing Analyses 36
 
Summary 37
 
Recommended Reading 38
 
Chapter 3 * Learning the "Hello World" of Security Data Analysis 39
 
Solving a Problem 40
 
Getting Data41
 
Reading In Data 43
 
Exploring Data 47
 
Homing In on a Question 58
 
Summary 70
 
Recommended Reading 70
 
Chapter 4 * Performing Exploratory Security Data Analysis 71
 

Dissecting the IP Address73
 
Representing IP Addresses 73
 
Segmenting and Grouping IP Addresses 75
 
Locating IP Addresses 77
 
Augmenting IP Address Data80
 
Association/Correlation, Causation, and Security Operations Center Analysts Gone Rogue 86
 
Mapping Outside the Continents90
 
Visualizing the ZeuS Botnet 92
 
Visualizing Your Firewall Data 98
 
Summary 100
 
Recommended Reading101
 
Chapter 5 * From Maps to Regression 103
 
Simplifying Maps 105
 
How Many ZeroAccess Infections per Country? 108
 
Changing the Scope of Your Data 111
 
The Potwin Effect 113
 
Is This Weird? 117
 
Counting in Counties 120
 
Moving Down to Counties 122
 
Introducing Linear Regression 125
 
Understanding Common Pitfalls in Regression Analysis 130
 
Regression on ZeroAccess Infections 131
 
Summary 136
 
Recommended Reading 136
 
Chapter 6 * Visualizing Security Data 137
 
Why Visualize? 138
 
Unraveling Visual Perception 139
 
Understanding the Components of Visual Communications 144
 
Avoiding the Third Dimension 144
 
Using Color 146
 
Putting It All Together 148
 
Communicating Distributions 154
 
Visualizing Time Series 156
 
Experiment on Your Own 157
 
Turning Your Data into a Movie Star 158
 
Summary 159
 
Recommended Reading 160
 
Chapter 7 * Learning from Security Breaches 161
 
Setting Up the Research 162
 
Considerations in a Data Collection Framework 164
 
Aiming for Objective Answers 164
 
Limiting Possible Answers 164
 
Allowing "Other," and "Unknown" Options 164
 
Avoiding Conflation and Merging the Minutiae 165
 
An Introduction to VERIS 166
 
Incident Tracking 168
 
Threat Actor 168
 
Threat Actions 169
 
Information Assets 173
 
Attributes 173
 
Discovery/Response 176
 
Impact 176
 
Victim 177
 

Product details

Authors Jay Jacobs, Jacobs Jay, Bob Rudis, Rudis Bob
Publisher Wiley & Sons
 
Languages English
Product format Paperback / Softback
Released 08.04.2014
 
EAN 9781118793725
ISBN 978-1-118-79372-5
No. of pages 352
Dimensions 187 mm x 232 mm x 19 mm
Weight 796 g
Subjects Natural sciences, medicine, IT, technology > IT, data processing > Data communication, networks

Computersicherheit, Informatik, computer science, Networking / Security, Netzwerke / Sicherheit

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.