HOME

TheInfoList



OR:

User behavior analytics (UBA) is a
cybersecurity Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, t ...
process regarding the detection of insider threats, targeted attacks, and
financial fraud In law, fraud is intentional deception to secure unfair or unlawful gain, or to deprive a victim of a legal right. Fraud can violate civil law (e.g., a fraud victim may sue the fraud perpetrator to avoid the fraud or recover monetary compensa ...
that tracks a system's users. UBA looks at patterns of
human behavior Human behavior is the potential and expressed capacity ( mentally, physically, and socially) of human individuals or groups to respond to internal and external stimuli throughout their life. Kagan, Jerome, Marc H. Bornstein, and Richard M. ...
, and then analyzes observations to detect anomalies that may indicate potential threats.


Purpose

The purpose of UBA, according to Johna Till Johnson of
Nemertes Research Nemertes Research is an American research-advisory firm that specializes in analyzing and quantifying the business value of emerging technologies headquartered in Lusby, MD. The Times called it "a respected American think-tank", while others ment ...
, is that "
Security system A security alarm is a system designed to detect intrusion, such as unauthorized entry, into a building or other areas such as a home or school. Security alarms used in residential, commercial, industrial, and military properties protect against ...
s provide so much information that it's tough to uncover information that truly indicates a potential for real attack. Analytics tools help make sense of the vast amount of data that
SIEM Siem is a surname. Notable people with the surname include: *Charlie Siem (born 1986), British violinist *Kjetil Siem (born 1960), Norwegian businessperson, journalist, author and sports official *Kristian Siem (born 1949), Norwegian businessman *M ...
, IDS/IPS,
system log In computing, logging is the act of keeping a log of events that occur in a computer system, such as problems, errors or just information on current operations. These events may occur in the operating system or in other software. A message or ...
s, and other tools gather. UBA tools use a specialized type of security analytics that focuses on the behavior of systems and the people using them. UBA technology first evolved in the field of marketing, to help companies understand and predict consumer-
buying pattern Consumer behavior is the study of individuals, groups, or organizations and all the activities associated with the purchase, use and disposal of goods and services. Consumer behaviour consists of how the consumer's emotions, attitudes, and p ...
s. But as it turns out, UBA can be extraordinarily useful in the security context too."User behavioral analytics tools can thwart security attacks


See also

* Behavioral analytics *
Network behavior anomaly detection #REDIRECT Network behavior anomaly detection {{Rcatshell, {{R from move{{R from alternative capitalisation ...
*
User activity monitoring In the field of information security, user activity monitoring (UAM) is the monitoring and recording of user actions. UAM captures user actions, including the use of applications, windows opened, system commands executed, checkboxes clicked, text e ...


References

{{Reflist


External links


ABC's Of UBA
Software