Skip to content
Scan a barcode
Scan
Added to your cart
Paperback Predictive Cyber Threat Analysis using Data Science: An Overview of Possibilities Book

ISBN: 1546727841

ISBN13: 9781546727842

Predictive Cyber Threat Analysis using Data Science: An Overview of Possibilities

Data Science methods can be applied to any imaginable goal and offer insight into how to progress from the status quo to a much higher level of cyber security. This short book addresses some of the possible approaches to applying data science to security needs, how to identify open source tools, and how to potentially implement visualization and statistical analysis for use in the area of Predictive Cyber Threat Analysis. Because of the vast amount of data that is produced by modern networks, novel methods and techniques are needed to predict cyber threats. The landscape of current threats requires new analysis methods. This paper explores how data science and visualization tools and technology aid in this mission; allowing the naked eye to detect patterns and obtain insight into our networks. This paper investigates the options available to security engineers, analysts, and investigators for exploiting "big data." We question: -How is Data Science used to predict cyber threats? What are open source tools available for statistical analysis? -What methods provide the best visual representation of our analysis? By developing an understanding of big data, we can adapt to meet the rapid and ever-evolving cyber threat to our national security. Once understood, training, tools, and processes can be implemented in cyber threat analysis. Our purpose is to help organizations; to develop, a basic understanding of data science, to identify possible tools to used to in data science and security, and finally to focus on applications that can be used to target cyber threats. "The state of information security is in disarray." (Braxton, 2015). Groups from every industry are failing to detect attacks. A primary cause of today's failures in both security prevention and detection is the ever-increasing amount of data that networks must process. Data immersion is not a new concept. Experts agree that the phenomenon is accelerating. "Lakes, puddles, and rivers of data have turned to floods and veritable tsunamis of structured, semi-structured, and unstructured data that's streaming from almost every activity that takes place in both the digital and physical worlds" (Pierson, 2015). This is big data, and it is only getting bigger. Keywords: Data Science, Security, cognitive science, Open Source, visualization, threat analysis, threat intelligence.

Recommended

Format: Hardcover

Condition: Very Good*

*Best Available: (ex-library)

$10.09
Save $149.91!
List Price $160.00
Almost Gone, Only 1 Left!

Customer Reviews

0 customer rating | 0 review

Rated 5 stars
Steal this book!

The style of this book is excellent in that it gives you plenty of examples of how fuzzy arithmetic works. Honestly, I doubt there exists a more comprehensive book on fuzzy arithmetic around. You'll find information on fuzzy numbers and their basic arithmetic, how alpha cuts work in fuzzy arithemtic, type-two fuzzy numbers, probabilisitic-fuzzy hybrid numbers, fuzzy modular arithmetic, combinatorics with fuzzy numbers, and...

0Report

Rated 4 stars
Outstanding - a book that opens many doors.

I've had this book for years, and keep coming back to it. Many books define fuzzy numbers in various ways, and hint at combining them with some kind of arithmetic. Kaufmann and Gupta actually carry out those operations. Since fuzzy addition is a kind of convolution, they also show why fuzzy subtraction does not reverse the operation - deconvolution does. If you want to use fuzzy arithmetic for constraint propagation, this...

0Report

Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured