Additional Data Analysis, Session Data, Statistical Data Distinguish between full content data (including collection tools), session data (including collection tools) and statistical data (i
Additional Data Analysis, Session Data, Statistical Data Distinguish between full content data (including collection tools), session data (including collection tools) and statistical data (including collection tools).
Research the topics. I attached an example of a post below.
Example:
Good Evening,
This week we are discussing the difference between full content data, session data, and statistical data. It’s important to first understand that security monitoring is an absolute must in every organization. When you have security monitoring in place, it allows the security department to gather, analyze and set up solutions to prevent any data breach.
Full content data is the most flexible form of network-based information and probably the most important. It also provides the most information and details. Full content data allows you to narrow down on specific protocols and even IP addresses and the ability to slice and dice the data into so many different ways. “It provides granularity and application relevance, which means, granularity is the collection of every nuanced bit in a packet and application relevance refers to saving the information passed above the transport layer” (Bejtlich, 2004). A few tools are TCPdump, Libpcap, Tethereal, and Snort.
Session data is a summary of a packet exchange between two systems. Session data include several core elements that includes source IP, source port, destination IP, destination port, timestamp, and can even measure the amount of information exchanged during a session. Session data collects everything and anything it sees, which makes tracking hackers possible. Some tools that can be used is Cisco’s NetFlow, Fprobe, and Ng_netflow.
Statistical data is used to identify and validate intrusions. It allows you to review and summarize a collection of data in a clear way. Statistical data can be used to create a baseline and see what has been triggered. It allows you to have a better understanding of what is happening to the network. A few tools are cisco accounting, Ipcad, Ifstat, and Bmon.
Thank you ????
Sam
Bejtlich, R. (2004). The Tao of Network Security Monitoring Beyond Intrusion Detection. Addison-Wesley Professional.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.