Index
Page references in italics refer to figures.
A
- “absurdity test”
- Adobe
- Advanced Data Stealing Threat (ADST) (dimensional modeling use case)
- “Aggregating Data Sources for Cyber Insights” (Lipkis, Chan, Lee)
- AIR Worldwide
- alpha distribution parameters
- beta distribution, overview
- beta distribution case (AllClear ID), (See also beta distribution parameters)
- overview
- SDA example model (R programming)
- truncated power law and
- “analysis placebo”
- analytics technology, building. See also business intelligence (BI)
- anchoring
- Andreassen, Paul
- Anthem
- Aon
- APIs (application program interfaces)
- Armstrong, J. Scott
- assets
- at-risk value of assets
- dimensional modeling example
- “assumptions”, avoiding
- attack surface, defined
- Attitudes Toward Quantitative Methods (ATQM) (survey)
- audits
B
- Bayes, Thomas
- “Bayesian” interpretation
- Bayesian methods
- applying
- Bayes and probability theory, overview
- Bayes triplot and beta select function
- binary terms, defined
- estimating value of information for cybersecurity
- Lens method
- leveraging existing resources to reduce uncertainty
- log odds ratio (LOR) method
- major data breach example
- node probability table (NPT)
- overview
- prescriptive analytics example
- betadist (Excel function)
- beta distribution parameters
- applying beta to breaches
- Bayes triplot and beta select function
- calculations with
- case study (AllClear ID)
- computing frequencies with
- defined
- effect of
- overview
- reducing uncertainty and
- betainv (Excel function)
- beta.inv (Excel function)
Get How to Measure Anything in Cybersecurity Risk now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.