O'Reilly logo

Information Security Analytics by I Miyamoto, Jason Martin, Mark Talabis, Robert McPherson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4

Simulations and Security Processes

Abstract

There are a lot of interesting uses for simulations in security. One of them is evaluating the effect of security controls or mechanisms in your enterprise that otherwise would be difficult to recreate. In this chapter, we use the Arena software to demonstrate the power of simulations, using a scenario involving the evaluation of antivirus (AV) e-mail security gateway products. Other security applications of simulations include determining the effects of patching or frequency of AV updates, and evaluating different types of cyber attacks against your organization.

Keywords

Arena; Conceptual model; Descriptive statistics; Evaluating performance; Security analytics; Simulations
Information in this ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required