Wednesday, August 5, 2020

Word of the Day: behavior-based security

 
Word of the Day WhatIs.com
Daily updates on the latest technology terms | August 5, 2020
behavior-based security

Behavior-based security is a proactive approach to security in which all relevant activity is monitored so that deviations from normal behavior patterns can be identified and dealt with quickly. As machine learning continues to improve, this approach to security management is expected to play an important role in securing computing at the edge of the network.

 

Traditional security software is signature-oriented: the software monitors data streams and compares data in transit to signatures in an anti-virus vendor's library of known threats. Behavior-based security programs work a little differently -- they monitor data streams too, but then they compare data stream activity to a baseline of normal behavior and look for anomalies. Behavior-based security products use applied mathematics and machine learning to flag events that are statistically significant.

 

While there may still be instances where an organization needs to choose between signature-based and anomaly-based security software, there is a broad range of intrusion detection and prevention products that combine both approaches.

Depending upon its capabilities, a behavior-based security software product may be marketed as a network behavior anomaly detection (NBAD) product, a behavior-based intrusion detection product, a behavior threat analysis (BTA) product or a user behavior analytics (UBA) product. Continue reading...

Today's Takeaway

 

"Anomaly detection can drastically change -- and improve -- the way IT teams monitor system performance. In particular, it can reduce analyst fatigue, eliminate false alarms and more quickly uncover events that are truly significant within an IT environment."
Walker Rowe

3 Related Tutorials

 

Zero trust
What exactly is a zero-trust security model? This primer explains how to design a security architecture that will keep your network safe.

Behavioral analytics
Real-time behavioral threat analytics is the next frontier in security. Learn how a behavioral threat assessment tool can protect your enterprise systems and data.

 

Threat intelligence
It's easy to focus on the next big advanced persistent threat, RAT or zero day, and forget that nearly all breaches that use these tools start with a phishing attack.

Do You Speak Security?

 
According to Google, the company spent more than $6.5 million in 2019 on this:

 

a. end user security awareness
b. bug bounty program

Answer


Stay in Touch

 

Thank you for reading! For feedback about any of our definitions or to suggest a new definition (or learning resource) please contact us at: editor@whatIs.com

FOLLOW US

TwitterRSS
About This E-Newsletter
The Word of the Day is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: