dcsimg
Main » TERM » U »

UEBA (User and Entity Behavior Analytics)

User and Entity Behavior Analytics (EUBA) is a comprehensive cybersecurity process that protects a company’s IT infrastructure. It uses machine learning and advanced algorithms for tracking all users, entities, and events in the system to detect anomalies and suspicious activities that might compromise data security. 

Hackers are everywhere, breaking into firewalls and accessing protected data. Not only do they send malware and virus-infected emails, but they also infiltrate a company’s security system by conniving with, coercing, or bribing an employee. Globally, the annual cost of cybercrime, which involves hacking, data theft, sabotage, abuse, and security breach, is predicted to hit $6 trillion by 2021.

UEBA is an extension of an earlier User Behavior Analytics (UBA). This cybersecurity process employs statistical analytics powered by artificial intelligence and machine learning to monitor user activities and behavior and keep a record of reports and logs. It establishes a user’s ‘normal’ patterns, identifies deviations, and sends alerts when potential security threats are detected.

Benefits of UEBA 

If hackers get into a company’s IT infrastructure, UEBA provides the following advantages:

  • It detects insider threats, compromised accounts, brute-force attacks, changes in user permissions, creation of super users, unauthorized privilege escalation, and breach of protected data.
  • It signals an alarm as soon as anomalies are detected, which allows the company’s IT department to minimize the damage.
  • It helps mitigate threats, prevent data theft, and reduce vulnerability to cyberattacks.
  • It complements the existing security tracking system and enhances a company’s overall IT security posture.

How UEBA works 

UEBA focuses on insider threats—employees with access to the system compromised due to stolen usernames and passwords or those conspiring with outsiders to carry out data breaches. It uses risk-scoring techniques and deep learning to track user behavior and detect anomalies over time.

It analyzes all users, entities, and events to determine what can be considered ‘normal’ behavior. Stealing security information from employees might be easier to do, but mimicking the person’s behavior in the network is harder. A sudden increase in the file size of sensitive information downloaded daily, for example, triggers an alarm. UEBA quickly detects complex attacks and breaches across the system.










LATEST ARTICLES
Texting & Chat Abbreviations

From A3 to ZZZ we list 1,559 text message and online chat abbreviations to help you translate and understand today's texting lingo. Includes Top... Read More »

Huge List of Computer Certifications

Have you heard about a computer certification program but can't figure out if it's right for you? Use this handy list to help you decide. Read More »

STUDY GUIDES
Computer Architecture Study Guide

Computer architecture provides an introduction to system design basics for most computer science students. Read More »

Network Fundamentals Study Guide

Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and... Read More »

The Five Generations of Computers

Learn about each of the five generations of computers and major technology developments that have led to the computing devices that we use... Read More »