Index

Access control, 20–21

Access prevention, 52

Account takeover, 15

Accuracy, 77

vs. epoch graph, 85

Advanced persistent threats, 15

Adware, 11

Akaike’s information criterion (AIC), 92

Antivirus software, 44–45

Application cybersecurity, 43

Application security, 9–10, 19, 23, 30, 35–36

Artificial intelligence (AI)

approach, 69–72

cybersecurity, 102–105

design of, 2–3

detect phase, 79–89

discovery phase, 72–77

evaluation, 77–79

for federal cybersecurity, 62–63

and human security, 59

integrated system, 66

machine learning and, 15–17, 60–62

mind map, 3–4

monitor phase, 101–107

protect phase, 99–100

and security, 57–63

start-up companies, 61–62

threat response phase, 97–99

threat score phase, 89–97

transformation, 61

Assess management, 34

Asset ...

Get Artificial Intelligence for Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.