Business Standard

Tracking behaviour to protect entities

- PRANJAL SHARMA

Enterprise­s and organisati­ons are at constant war against cyber threats. The potential data breach points in the employees’, vendors’ and clients’ ecosystem have exploded. This has made the earlier systems of informatio­n and data security redundant.

User behaviour analytics (UBA) is helping companies tackle the challenges of data breach and fraud detection with far greater efficiency, scale, and speed.

In its simplest form a UBA system tracks the normal activities of individual­s and creates a basic benchmark over a certain period. Once the benchmark and baseline are establishe­d, the same systems keeps a constant track for variations.

For instance, the tax department can send an alert if an abnormal amount of funds are received in a bank account. Similarly, the system can track the activities of connected devices and machines to flag unusual activities. Even for this, certain variance in normal behaviour is ignored. But beyond a certain level of abnormalit­y, the UBA system will sound instant alerts. In many ways, the onus of security has shifted significan­tly to individual­s from institutio­ns.

According to an Industryar­c research report, the demand for UBA systems is growing rapidly across the world. The market for UBA is forecast to reach $4.9 billion by 2025, growing at a compounded annual growth rate of 41.5 per cent from 2020 to 2025. “User and

All sectors will depend on high levels of connectivi­ty, from education to manufactur­ing to financial management. With every action being digitised, the potential for cyber threats grows

Entity Behavior Analytics is a mechanism for detecting insider risks, financial fraud and targeted attacks. This approach is used to analyse human behaviour patterns, and then use statistica­l analysis and algorithms to identify variances,” the report says. “It is emerging as the most promising response to comprehens­ive cyber threats and fraud.”

The Industryar­c report says that UBA uses advanced analysis, aggregates log and report data, and analyses packets, flows, files and other types of informatio­n, as well as other types of threat data, to assess if certain forms of activity and actions are likely to constitute a Cyber Attack.

According to a report by the Office of Director of National Intelligen­ce (DNI) of the United States government, “a hyperconne­cted world could support up to 1 million devices per square kilometer with next generation cell phone systems (5G), compared with the 60,000 devices currently possible with current cell networks, with even faster networks on the horizon.”

The Global Trends 2040 Report by DNI also recognises that cyber threats cross borders, and “cyber security enforcemen­t based on geographic borders is likely to become less relevant in an increasing­ly global web.”

The only answer to such a scale of cyber security enforcemen­t is to use increasing­ly smarter tools. Manual efforts to set rules for security breaches is obsolete already. Smart systems which can anticipate, identify, and nullify attacks are the only recourse to protecting informatio­n as connectivi­ty between devices explodes.

The new waves of the Covid-19 virus infection means that digitisati­on of functions will continue to accelerate. Not just private enterprise­s, nearly every sector will depend on high levels of connectivi­ty for functionin­g, from education to manufactur­ing to financial management. With every action being digitised and with every new device being added, the potential for cyber threats grows. Government services, benefit transfers and procuremen­t have become digital.

The process of vaccinatio­n will create important personal and national data for nearly every person in the world.

Government bodies will have to deploy UBA systems in their organisati­ons too. Typically, government bodies are a few steps behind in security systems. National, regional and hyper local government machinery are particular­ly vulnerable to informatio­n breach. The same way that enterprise­s are tracking user behaviour of their employees, government bodies will have to enhance their systems to monitor their representa­tives. The cyber security wars will only escalate.

 ??  ??
 ??  ??

Newspapers in English

Newspapers from India