User Behavior Analytics
   HOME

TheInfoList



OR:

User behavior analytics (UBA) is a
cybersecurity Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, the ...
process regarding the detection of insider threats, targeted attacks, and
financial fraud In law, fraud is intent (law), intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right. Fraud can violate Civil law (common law), civil law (e.g., a fraud victim may sue the fraud perpetrator to avoid t ...
that tracks a system's users. UBA looks at patterns of
human behavior Human behavior is the potential and expressed capacity ( mentally, physically, and socially) of human individuals or groups to respond to internal and external stimuli throughout their life. Kagan, Jerome, Marc H. Bornstein, and Richard M. L ...
, and then analyzes observations to detect anomalies that may indicate potential threats.


Purpose

The purpose of UBA, according to Johna Till Johnson of Nemertes Research, is that "
Security system A security alarm is a system designed to detect intrusion, such as unauthorized entry, into a building or other areas such as a home or school. Security alarms used in residential, commercial, industrial, and military properties protect against ...
s provide so much information that it's tough to uncover information that truly indicates a potential for real attack. Analytics tools help make sense of the vast amount of data that
SIEM Siem is a surname. Notable people with the surname include: * Charlie Siem (born 1986), British violinist * Kjetil Siem (born 1960), Norwegian businessperson, journalist, author and sports official * Kristian Siem (born 1949), Norwegian businessman ...
,
IDS IDS may refer to: Computing * IBM Informix Dynamic Server, a relational database management system * Ideographic Description Sequence, describing a Unihan character as a combination of other characters * Integrated Data Store, one of the first da ...
/IPS, system logs, and other tools gather. UBA tools use a specialized type of security analytics that focuses on the behavior of systems and the people using them. UBA technology first evolved in the field of marketing, to help companies understand and predict consumer-
buying pattern Consumer behavior is the study of individuals, groups, or organizations and all the activities associated with the purchase, use and disposal of goods and services. Consumer behaviour consists of how the consumer's emotions, attitudes, and p ...
s. But as it turns out, UBA can be extraordinarily useful in the security context too."User behavioral analytics tools can thwart security attacks


See also

*
Behavioral analytics Behavioral analytics is a recent advancement in business analytics that reveals new insights into the behavior of consumers on eCommerce platforms, online games, web and mobile applications, and IoT. The rapid increase in the volume of raw event ...
*
Network behavior anomaly detection #REDIRECT Network behavior anomaly detection {{Rcatshell, {{R from move{{R from alternative capitalisation ...
*
User activity monitoring In the field of information security, user activity monitoring (UAM) is the monitoring and recording of user actions. UAM captures user actions, including the use of applications, windows opened, system commands executed, checkboxes clicked, text e ...


References

{{Reflist


External links


ABC's Of UBA
Software