Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Part I: Understanding the Dark Side: Malicious Intent
Chapter 1: Analyzing the Malicious Individual
Analyzing the Unique Individual
Richard Reid: The Shoe Bomber
Ted Bundy: The Infamous Serial Murderer
The Individual Cyber Attacker
Modeling the Individual: Advantages and Disadvantages
Advantages of AuBA #1: Automated Summarization
In Summary
Chapter 2: Analyzing the Malicious Group
Understanding the Group Adversary
Analyzing al-Qaeda
Analyzing Hezbollah
Analyzing the Coordinated Group Cyber Threat
Advantages of AuBA #2: Theme-Guided Smart Searches
In Summary
Chapter 3: Analyzing Country-Level Threats
Threats to Our National Infrastructure
Analyzing the Specific Threat of Terrorist Attacks
Improving Network Security
Facing Chemical, Biological, Radiological, and Nuclear (CBRN) Threats
Advantages of AuBA #3: Reducing Errors and Inefficiencies of Manual Predictive Modeling
In Summary
Chapter 4: Threats and Security Nightmares: Our Current Reactive State of Security
Analyzing Mall, School, Workplace, and Other Seemingly Random Public Violence
Unanticipated Terrorist Network Attacks
Can Technology Detect First-Time Attacks?
Advantages of AuBA #4: Building Predictive Applications
In Summary
Chapter 5: Current Network Security
Hacking and National Network Security
Growing Damage and Threat
Assessing Current Technology
Moving Toward Fixing Current Ineffective Network Protection
Envisioning an Effective Future Network Protection Technology
Advantages of AuBA #5: Conducting a Human Behavior Assessment of Threats from Network Packets
In Summary
Chapter 6: Future Threats to Our National Security
Our Growing National Security Dependency on Computers and Networks
Increasing Threat on a Global Basis
The Dire Need for New Proactive Methods
Advantages of AuBA #6: Automated Pattern Classification
In Summary
Part II: Dissecting Malicious Behavior
Chapter 7: Applying Behavior Principles: Predicting Individual Malicious Behavior
Using a Behavior Analysis Methodology That Works
Using Behavior Principles to Analyze Behavior
Environmental Variables
Different Environments, Different Antecedents
Antecedents, Behavior, and Consequences
Behavior Modeling
Advantages of AuBA #7: Incorporating, Refining, and Expanding Behavior Principles for Global Security
In Summary
Chapter 8: Applying Behavior Principles: Predicting Group Malicious Behavior
Analyzing Threat
Group Attempts to Inflict Harm and Damage
Moving from Analysis to Prediction of Malicious Behavior
How Do You Know the Predictive Application Works?
Advantages of AuBA #8: Automating Behavioral and Computer Sciences to Ensure Success
In Summary
Chapter 9: Applying a Predictive Methodology: From Principles to Practice
Construction of Predictive Models
What Is Needed: The Behavioral Methodologies
Making Sure It Works: An Introductory Example
Testing and Use in the Real World: Implications
Advantages of AuBA #9: Designing the Focus of an AuBA-Developed Model
In Summary
Chapter 10: Predicting Domestic Threat
Characterizing Domestic Threat
The Malicious Insider: Spies, Thieves, and Sabotage
Advantages of AuBA #10: Moving from Reactive to Proactive
In Summary
Chapter 11: Computer Networks: Protection from External Threat
Protecting Against Known Attacks: Signature Detection
Identifying Unknown and First-Time Attacks
Forensics: Studying and Defining the Past
Advantages of AuBA #11: Network Intrusion—Converting Digital Information to Human Behavior Assessment
In Summary
Chapter 12: Computer Networks: Protection from Internal Threat
Defining the Insider
Current Trends in Insider Threat Protection
Advantages of AuBA #12: Powerful Predictive Analysis Engines That Fit on a Laptop
In Summary
Chapter 13: Predicting Global Threat
Understanding State-Sponsored Threat
Describing and Identifying Future Global Threat
Understanding the Role of Network Forensics
Determining State Support of Terrorist Activities
Moving from Detection to Protection: A Major Leap
Advantages of AuBA #13: The AuBA Behaviorprint and How It Compares to Signatures
In Summary
Part III: Applying Tools and Methods
Chapter 14: Predictive Capability in Software: Tools for a New Approach
Fusing Computer and Behavioral Sciences
Using the Computer's Speed and Memory to Our Benefit
Human Bias: The Enemy to Accuracy and Analysis
Capturing Cultural Nuances
Moving from Theory to Practice: A Necessary Transition
Advantages of AuBA #14: Incorporating Key Technological Advances
In Summary
Chapter 15: Predictive Behavioral Modeling: Automated Tools of the Trade
Automated Behavior Analysis (AuBA)
ThemeMate
AutoAnalyzer
Using the Advantages of Speed, Accuracy, and Lack of Bias
Conducting Behavioral Modeling: Integrating ThemeMate and AutoAnalyzer
Advantages of AuBA #15: What Is the AuBA Predictive Engine?
In Summary
Chapter 16: Developing AuBA Applications
Modeling from Text Accounts of Past Behavior
Modeling from Sensor Output
Advantages of AuBA #16: Extending Our Analytical Brains
In Summary
Chapter 17: Mastering AuBA Tools for Real-World Use
Predicting the Unpredictable: Identifying Future Malicious Behavior
Advantages of AuBA #17: Versatility
In Summary
Chapter 18: Analyzing Future Malicious Behavior
The Necessity of Context in Predicting Future Behavior
Analyzing the Individual and the Group
Analyzing Threat on a Global Level
Implications for Security
Advantages of AuBA #18: Automated Characterization of Network Attacks
In Summary
Part IV: Predicting Malicious Behavior: Tools and Methods to Support a Paradigm Shift in Security
Chapter 19: AuBA Future Extensions Today
Predicting New Adversary Threat with Enhanced Accuracy
A Behavioral Science–Based Paradigm Shift
Advantages of AuBA #19: AuBA in the Future
In Summary
Chapter 20: How to Predict Malicious Behavior: A Walkthrough
A Manual Walkthrough of AuBA Principles
Moving Beyond the Clinical Setting to Expanded Environments: Automated Assist
Full Automation of the Prediction of Human Behavior: Automated Behavior Analysis
Advantages of AuBA #20: Final Thoughts
In Summary
Foreword
Introduction
Download CD/DVD content
← Prev
Back
Next →
← Prev
Back
Next →