Documente Academic
Documente Profesional
Documente Cultură
for Security
Other books by Archie Addo published by Business Expert Press
10 9 8 7 6 5 4 3 2 1
Keywords
project management; construction management; program management;
skills development; security; artificial intelligence; analytics; ML; mitiga-
tion; performance review; data science and business intelligence
Contents
Acknowledgments�����������������������������������������������������������������������������������ix
Chapter 1 Introduction���������������������������������������������������������������������1
Chapter 2 Introduction to Security���������������������������������������������������5
Chapter 3 How AI and Security Come Together?����������������������������57
Chapter 4 Knowledgebase���������������������������������������������������������������65
Chapter 5 AI Solutions for Security�������������������������������������������������69
Chapter 6 Industry Domain����������������������������������������������������������109
Chapter 7 Conclusion�������������������������������������������������������������������127
References�������������������������������������������������������������������������������������������129
About the Authors�������������������������������������������������������������������������������133
Index�������������������������������������������������������������������������������������������������135
Acknowledgments
Our artificial intelligence (AI) and security expert colleagues have worked
in the international corporate world to acquire knowledge and expertise.
AI and security researchers and practitioners have had a profound impact
on our thinking and on the contents of this book. Subsequently, working
with many corporate customers has greatly influenced the preparation of
this material.
Thank you to our parents, Godson Addo, Mary (Vanderpuije) Addo,
Seetharaman Centhala, Thulasi Centhala, K. Shanmugam, and S. Saroja,
for encouraging us to get an education and work diligently in our field.
We do not think we would have made it this far without their support.
We would like to extend great thanks to our families: Louvaine Addo,
Mala Srini, and Kavitha Muthu; Archie and Srini’s children: Koushik
Seethula, Shashank Seethula, and Srima Seethula; and Muthu’s children:
Maanasa Muthu and Sarvesh Muthu for their collective patience with our
busy schedules.
Thank you to Editide for copyediting. We would like to extend great
thanks to Venkat and everyone at Bizstats Technologies Pvt. Ltd. who
enabled us to be Software-as-a-Service (SaaS) BizStats AI company, which
provided major input for this book.
CHAPTER 1
Introduction
• Target Audience
• What Do You Get from the Book?
• What This Book Covers
• This Book’s Mind Map
• Organization of Chapters
ÿÿ Introduction to Security
ÿÿ Introduction to the AI Knowledge Base
ÿÿ How AI Security Comes Together
ÿÿ Business Use Cases
ÿÿ AI Solutions for Security
ÿÿ Industry Domain
• Conclusion
• References
Chapter Outline
• Book introduction
• Organization of the book
• Chapter introduction
Target Audience
This book mainly focuses on how artificial intelligence (AI) can be applied
to security management. This book follows current trends of AI in the
2 Artificial Intelligence for Security
Introduction
AI for security
Security terms
Security management
and terminologies
Security information
Information security
classifications
Asset Discovery
Discover AI
Intrusion detection
Endpoint
detection and response
AI
Monitor AI Solutions Detect AI
for security
Monitor in
discover phase
Monitor in
detect phase
Monitor in threat
scoring phase
Monitor in threat Threat score AI
response phase
Moniter in
pretect phase