<s>
User	B-Application
behavior	I-Application
analytics	I-Application
(	O
UBA	O
)	O
is	O
a	O
cybersecurity	O
process	O
regarding	O
the	O
detection	O
of	O
insider	O
threats	O
,	O
targeted	O
attacks	O
,	O
and	O
financial	O
fraud	O
that	O
tracks	O
a	O
system	O
's	O
users	O
.	O
</s>
<s>
Analytics	O
tools	O
help	O
make	O
sense	O
of	O
the	O
vast	O
amount	O
of	O
data	O
that	O
SIEM	O
,	O
IDS/IPS	O
,	O
system	B-Application
logs	I-Application
,	O
and	O
other	O
tools	O
gather	O
.	O
</s>
