Completed
Behavioral detection: Behavioral biometric detection
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Who's in Control: Human or Machine? - Behavioral Detection in Cybersecurity
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Types of attack
- 3 What drives attack sophistication
- 4 Evolution of attack and detection methods
- 5 Behavioral detection: User Behavior Analysis
- 6 Behavioral detection: Behavioral biometric detection
- 7 Behavioral Detection Use Cases
- 8 User Behavioral Analysis Examines the context of the interactions
- 9 Behavioral biometrics available depends on the client
- 10 Behavioral biometrics - Mouse Motion Timing
- 11 Behavioral biometrics - Mouse Velocity
- 12 Behavioral biometrics - Mouse Acceleration
- 13 Behavioral biometrics - Touch interactions Machine
- 14 Behavioral biometrics - Key Press Metrics
- 15 Behavioral biometrics - Spoofing • Many different ways to falsify inputs
- 16 Why use behavioral detection? Pros