TECH DIGITAL RESOURCE LIBRARY

BAE Systems Applied Intelligence

BAE Systems Applied Intelligence delivers solutions, which help clients to protect and enhance their critical assets in the intelligence age. Its intelligent protection solutions combine large-scale data exploitation, 'intelligence-grade' security and complex services and solutions integration. The company operates in four key domains of expertise: cyber security, financial crime, communications intelligence and digital transformation. Leading enterprises and government departments use the solutions to protect and enhance physical infrastructure, mission-critical systems, valuable intellectual property, corporate information, reputation and customer relationships, competitive advantage and financial success.

Our Website: http://www.baesystems.com/ai


Latest Content From BAE Systems Applied Intelligence

Whitepaper: Stepping up to the plate: Fraud detection in service of the greater good

by BAE Systems Applied IntelligenceMay 20, 2014

Claims fraud is known to be a debilitating problem for the profitability of insurance companies (Aite Group estimates claims fraud in the P&C industry alone costs the US insurance industry $64 billion a year) - but what about for the general public? The Insurance Research Council points out that up to one in four Americans sees it as acceptable to exaggerate their insurance claims to compensate themselves for previous claim-free years of premium payments or to cover the deductibles on their claims. Insurance is a grudge purchase, but one which presents significant possibilities for opportunistic gain. One in ten people sees claims fraud as a victimless crime. In the traditional fraud triangle, claims fraud is one of the most trivial opportunities to achieve financial gain; it is easily rationalized by the general public as harming only blue chip companies who can afford to lose a few hundred dollars, and has a clear motivation - to reclaim money spent on previous premiums.

Download this 10-minute whitepaper to learn how counter fraud technology solutions increasingly need to support four stages of operations - all of which support the goal of treating customers fairly both directly and indirectly.


Whitepaper: Cyber threat landscape: Guide for business leaders

by BAE Systems Applied IntelligenceApr 09, 2014

The cyber security threat landscape is constantly evolving. The tools, behaviours and techniques of those attacking and defending organisations are constantly adapting to each other.

While high-profile attacks now regularly appear in the press, many decision makers are left wondering what steps they can actively take to stay on top of a threat which is forever changing.

In our report Cyber threat landscape: Guide for business leaders we outline five cyber attack trends with the potential to impact businesses and governments over the next twelve months -and recommend steps that organisations can take to mitigate them.


Whitepaper: Snake Campaign & Cyber Espionage Toolkit

by BAE Systems Applied IntelligenceApr 05, 2014

This new report from BAE Systems Applied Intelligence provides further details on how the recently disclosed 'Snake' cyber espionage toolkit operates. Timelines of the malware development show this to be much bigger campaign than previously known. Specifically it reveals that the malware has actually been in development since at least 2005. From the complexity of the malware, and the range of variants and techniques used to support its operation, the research also suggests that Snake's authors and operators are committed and well-funded professionals.


Whitepaper: Business and the Cyber Threat: The Rise of Digital Criminality

by BAE Systems Applied IntelligenceApr 05, 2014

Across the world, cyber attacks are now taking place on an industrial scale. The World Economic Forum has warned that the theft of information and the intentional disruption of online or digital processes are among the very top business risks that major institutions face. It also suggests, however, that improved cyber security could save the world economy trillions of dollars.

Recent high profile attacks have highlighted just how much cyber crime can cost vulnerable business; risks are growing as digital criminals become more adept, now employing a portfolio of attacks with the potential to damage national economies and radically undermine an organisation's ability to grow and innovate. Digital crime threatens to undermine not only an institution's reputation but its core competitive advantage. Against this backdrop, we set out to explore how organisations are reacting to a new era of digital criminality.


Whitepaper: Seriously Organized Crime: Tackling Cyber Enabled Financial Fraud

by BAE Systems Applied IntelligenceMar 03, 2014

Commercial organizations are under increasing attack from financial crime. And as those carrying out traditional fraud are adopting new techniques, that until recently were the domain of sophisticated cyber espionage groups, so commerce now has to manage a growing strategic risk to both their bottom-line and their brand reputation.

The following issues are highlighted in this new whitepaper:

•So what's happening?
•The attack components
•Taking control


Whitepaper: Part 1 Whitepaper - Why Use Big Data for Cyber Security? A Practical Guide Big Data Security Analytics

by BAE Systems Applied IntelligenceMar 03, 2014

Why Use Big Data for Cyber Security is number one in a series of three white papers - all focusing on Big Data solutions for cyber security analytics. In chapter one, we explore the value that big data analytics can bring to the cyber security problem. In chapter two we cover the importance of proper design and planning including business-driven strategies, requirements capture, and the risks in the market. Before acquiring new technology to implement a Big Data cyber security analytics solution, we recommend that you do a thorough analysis of the options available and measuring them against your requirements. In the last chapter, we talk about how our CyberReveal, a Big Data cyber security analytics capability, can help accelerate the application of Big Data to cyber security analytics.

The following issues are highlighted in this new whitepaper:
� A changing threat landscape
� Increased monitoring leads to big data
� Behavioral analytics for detection
� A big data platform for investigation


Whitepaper: Part 2 Whitepaper - Design & Choose the Right Solution : A Practical Guide Big Data Security Analytics

by BAE Systems Applied IntelligenceMar 03, 2014

Design and Choose the Right Solution is number two in a series of three white papers - all focusing on Big Data solutions for cyber security analytics. In chapter two we cover the importance of proper design and planning including business-driven strategies, requirements capture, and the risks in the market.

Before acquiring new technology to implement a Big Data cyber security analytics solution, we recommend that you do a thorough analysis of the options available and measuring them against your requirements. In chapter one, we explore the value that big data analytics can bring to the cyber security problem. In the last chapter, we talk about how our CyberReveal, a Big Data cyber security analytics capability, can help accelerate the application of Big Data to cyber security analytics.

The following issues are highlighted in this new whitepaper:

� Make a business case
� Capture requirements
� Consider risks in the market
� Characteristics for technology selection
� Implementation decisions


Whitepaper: Part 3 Whitepaper - How to Approach Implementation : A Practical Guide Big Data Security Analytics

by BAE Systems Applied IntelligenceMar 03, 2014

How to approach implementation is number three in a series of three white papers - all focusing on Big Data solutions for cyber security analytics. We are aware that application of Big Data is still new to cyber security analytics, and changes in both the Big Data and the security analytics markets are on the way. To support an early adopter approach, we have, in chapter one, described some implementation principles which have led to successful deployment. In chapter two, we go into details about how our CyberReveal solution started as an in-house project and became a Big Data cyber security analytics capability that can now be applied acrossmany industries. In the last chapter, we talk about how our CyberReveal, a Big Data cyber security analytics capability, can help accelerate the applications of Big Data to cyber security analytics.

The following issues are highlighted in this new whitepaper:

� Early adopter approach
� Example of a successful deployment
� Our big data security analytics