SlideShare a Scribd company logo
1 of 1
Additional Data Analysis, Session Data, Statistical Data Distinguish
between full
Additional Data Analysis, Session Data, Statistical Data Distinguish between full content data
(including collection tools), session data (including collection tools) and statistical data
(including collection tools).Research the topics. I attached an example of a post
below.Example:Good Evening,This week we are discussing the difference between full
content data, session data, and statistical data. It’s important to first understand that
security monitoring is an absolute must in every organization. When you have security
monitoring in place, it allows the security department to gather, analyze and set up
solutions to prevent any data breach.Full content data is the most flexible form of network-
based information and probably the most important. It also provides the most information
and details. Full content data allows you to narrow down on specific protocols and even IP
addresses and the ability to slice and dice the data into so many different ways. “It provides
granularity and application relevance, which means, granularity is the collection of every
nuanced bit in a packet and application relevance refers to saving the information passed
above the transport layer” (Bejtlich, 2004). A few tools are TCPdump, Libpcap, Tethereal,
and Snort.Session data is a summary of a packet exchange between two systems. Session
data include several core elements that includes source IP, source port, destination IP,
destination port, timestamp, and can even measure the amount of information exchanged
during a session. Session data collects everything and anything it sees, which makes
tracking hackers possible. Some tools that can be used is Cisco’s NetFlow, Fprobe, and
Ng_netflow.Statistical data is used to identify and validate intrusions. It allows you to review
and summarize a collection of data in a clear way. Statistical data can be used to create a
baseline and see what has been triggered. It allows you to have a better understanding of
what is happening to the network. A few tools are cisco accounting, Ipcad, Ifstat, and
Bmon.Thank you ????SamBejtlich, R. (2004). The Tao of Network Security Monitoring
Beyond Intrusion Detection. Addison-Wesley Professional.

More Related Content

Similar to Additional Data Session Statistical Data Distinguish between full.docx

Big Data Security Analytic Solution using Splunk
Big Data Security Analytic Solution using SplunkBig Data Security Analytic Solution using Splunk
Big Data Security Analytic Solution using SplunkIJERA Editor
 
Applicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsApplicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsIDES Editor
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datosSoftware Guru
 
Analysis of Network Traffic and Security through Log Aggregation
Analysis of Network Traffic and Security through Log AggregationAnalysis of Network Traffic and Security through Log Aggregation
Analysis of Network Traffic and Security through Log AggregationIJCSIS Research Publications
 
Audit logs for Security and Compliance
Audit logs for Security and ComplianceAudit logs for Security and Compliance
Audit logs for Security and ComplianceAnton Chuvakin
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemsMayank Diwakar
 
NIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real WorldNIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real WorldAnton Chuvakin
 
Log Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsLog Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsAnton Chuvakin
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCSITiaesprime
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityHappiest Minds Technologies
 
Logs for Information Assurance and Forensics @ USMA
Logs for Information Assurance and Forensics @ USMALogs for Information Assurance and Forensics @ USMA
Logs for Information Assurance and Forensics @ USMAAnton Chuvakin
 
Log Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsLog Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsAnton Chuvakin
 
Logging "BrainBox" Short Article
Logging "BrainBox" Short ArticleLogging "BrainBox" Short Article
Logging "BrainBox" Short ArticleAnton Chuvakin
 
Network security monitoring with open source tools
Network security monitoring with open source toolsNetwork security monitoring with open source tools
Network security monitoring with open source toolsterriert
 
Using metadata in filtered logs for prevention of database intrusion through ...
Using metadata in filtered logs for prevention of database intrusion through ...Using metadata in filtered logs for prevention of database intrusion through ...
Using metadata in filtered logs for prevention of database intrusion through ...IAEME Publication
 
Automatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram TechniqueAutomatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram TechniqueIRJET Journal
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...IJASRD Journal
 
the world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docxthe world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docxpelise1
 

Similar to Additional Data Session Statistical Data Distinguish between full.docx (20)

Big Data Security Analytic Solution using Splunk
Big Data Security Analytic Solution using SplunkBig Data Security Analytic Solution using Splunk
Big Data Security Analytic Solution using Splunk
 
Applicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer SystemsApplicability of Network Logs for Securing Computer Systems
Applicability of Network Logs for Securing Computer Systems
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datos
 
Analysis of Network Traffic and Security through Log Aggregation
Analysis of Network Traffic and Security through Log AggregationAnalysis of Network Traffic and Security through Log Aggregation
Analysis of Network Traffic and Security through Log Aggregation
 
Audit logs for Security and Compliance
Audit logs for Security and ComplianceAudit logs for Security and Compliance
Audit logs for Security and Compliance
 
IoT underthe hood
IoT underthe hoodIoT underthe hood
IoT underthe hood
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
cyber law and forensics,biometrics systems
cyber law and forensics,biometrics systemscyber law and forensics,biometrics systems
cyber law and forensics,biometrics systems
 
NIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real WorldNIST 800-92 Log Management Guide in the Real World
NIST 800-92 Log Management Guide in the Real World
 
Log Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsLog Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and Operations
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidence
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
 
Logs for Information Assurance and Forensics @ USMA
Logs for Information Assurance and Forensics @ USMALogs for Information Assurance and Forensics @ USMA
Logs for Information Assurance and Forensics @ USMA
 
Log Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and OperationsLog Analysis Across System Boundaries for Security, Compliance, and Operations
Log Analysis Across System Boundaries for Security, Compliance, and Operations
 
Logging "BrainBox" Short Article
Logging "BrainBox" Short ArticleLogging "BrainBox" Short Article
Logging "BrainBox" Short Article
 
Network security monitoring with open source tools
Network security monitoring with open source toolsNetwork security monitoring with open source tools
Network security monitoring with open source tools
 
Using metadata in filtered logs for prevention of database intrusion through ...
Using metadata in filtered logs for prevention of database intrusion through ...Using metadata in filtered logs for prevention of database intrusion through ...
Using metadata in filtered logs for prevention of database intrusion through ...
 
Automatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram TechniqueAutomatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram Technique
 
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
Secure Medical Data Computation using Virtual_ID Authentication and File Swap...
 
the world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docxthe world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docx
 

More from write4

roles are largely complete when they hand an investigation.docx
roles are largely complete when they hand an investigation.docxroles are largely complete when they hand an investigation.docx
roles are largely complete when they hand an investigation.docxwrite4
 
Role of the Military in Disaster.docx
Role of the Military in Disaster.docxRole of the Military in Disaster.docx
Role of the Military in Disaster.docxwrite4
 
Role of telemedinine in disease preventions.docx
Role of telemedinine in disease preventions.docxRole of telemedinine in disease preventions.docx
Role of telemedinine in disease preventions.docxwrite4
 
Role In Influencing Society.docx
Role In Influencing Society.docxRole In Influencing Society.docx
Role In Influencing Society.docxwrite4
 
Role of Private Security.docx
Role of Private Security.docxRole of Private Security.docx
Role of Private Security.docxwrite4
 
Robbie a 12 year old is hospitalized for multiple.docx
Robbie a 12 year old is hospitalized for multiple.docxRobbie a 12 year old is hospitalized for multiple.docx
Robbie a 12 year old is hospitalized for multiple.docxwrite4
 
Robbins Network Services.docx
Robbins Network Services.docxRobbins Network Services.docx
Robbins Network Services.docxwrite4
 
Robinson Crusoe review.docx
Robinson Crusoe review.docxRobinson Crusoe review.docx
Robinson Crusoe review.docxwrite4
 
Rocking Horse.docx
Rocking Horse.docxRocking Horse.docx
Rocking Horse.docxwrite4
 
Rodrigo El Cid Rodrigo after a to.docx
Rodrigo El Cid Rodrigo after a to.docxRodrigo El Cid Rodrigo after a to.docx
Rodrigo El Cid Rodrigo after a to.docxwrite4
 
Role in Decision Making What is should be.docx
Role in Decision Making What is should be.docxRole in Decision Making What is should be.docx
Role in Decision Making What is should be.docxwrite4
 
Samantha Chanel De Vera Posted Date Apr.docx
Samantha Chanel De Vera Posted Date Apr.docxSamantha Chanel De Vera Posted Date Apr.docx
Samantha Chanel De Vera Posted Date Apr.docxwrite4
 
Ruth milikan chapters 5 and 6 in her book varieties.docx
Ruth milikan chapters 5 and 6 in her book varieties.docxRuth milikan chapters 5 and 6 in her book varieties.docx
Ruth milikan chapters 5 and 6 in her book varieties.docxwrite4
 
Samantha Chanel De Vera Posted Date Mar.docx
Samantha Chanel De Vera Posted Date Mar.docxSamantha Chanel De Vera Posted Date Mar.docx
Samantha Chanel De Vera Posted Date Mar.docxwrite4
 
Russian Revolution Under Lenin and Trotsky.docx
Russian Revolution Under Lenin and Trotsky.docxRussian Revolution Under Lenin and Trotsky.docx
Russian Revolution Under Lenin and Trotsky.docxwrite4
 
Review the papers below and watch The Untold Story.docx
Review the papers below and watch The Untold Story.docxReview the papers below and watch The Untold Story.docx
Review the papers below and watch The Untold Story.docxwrite4
 
Samantha Chanel De Vera Posted Date May.docx
Samantha Chanel De Vera Posted Date May.docxSamantha Chanel De Vera Posted Date May.docx
Samantha Chanel De Vera Posted Date May.docxwrite4
 
Saudi Arabia.docx
Saudi Arabia.docxSaudi Arabia.docx
Saudi Arabia.docxwrite4
 
Right to Privacy.docx
Right to Privacy.docxRight to Privacy.docx
Right to Privacy.docxwrite4
 
Richard Rodriguez has generally been criticized by immigrant Identify.docx
Richard Rodriguez has generally been criticized by immigrant Identify.docxRichard Rodriguez has generally been criticized by immigrant Identify.docx
Richard Rodriguez has generally been criticized by immigrant Identify.docxwrite4
 

More from write4 (20)

roles are largely complete when they hand an investigation.docx
roles are largely complete when they hand an investigation.docxroles are largely complete when they hand an investigation.docx
roles are largely complete when they hand an investigation.docx
 
Role of the Military in Disaster.docx
Role of the Military in Disaster.docxRole of the Military in Disaster.docx
Role of the Military in Disaster.docx
 
Role of telemedinine in disease preventions.docx
Role of telemedinine in disease preventions.docxRole of telemedinine in disease preventions.docx
Role of telemedinine in disease preventions.docx
 
Role In Influencing Society.docx
Role In Influencing Society.docxRole In Influencing Society.docx
Role In Influencing Society.docx
 
Role of Private Security.docx
Role of Private Security.docxRole of Private Security.docx
Role of Private Security.docx
 
Robbie a 12 year old is hospitalized for multiple.docx
Robbie a 12 year old is hospitalized for multiple.docxRobbie a 12 year old is hospitalized for multiple.docx
Robbie a 12 year old is hospitalized for multiple.docx
 
Robbins Network Services.docx
Robbins Network Services.docxRobbins Network Services.docx
Robbins Network Services.docx
 
Robinson Crusoe review.docx
Robinson Crusoe review.docxRobinson Crusoe review.docx
Robinson Crusoe review.docx
 
Rocking Horse.docx
Rocking Horse.docxRocking Horse.docx
Rocking Horse.docx
 
Rodrigo El Cid Rodrigo after a to.docx
Rodrigo El Cid Rodrigo after a to.docxRodrigo El Cid Rodrigo after a to.docx
Rodrigo El Cid Rodrigo after a to.docx
 
Role in Decision Making What is should be.docx
Role in Decision Making What is should be.docxRole in Decision Making What is should be.docx
Role in Decision Making What is should be.docx
 
Samantha Chanel De Vera Posted Date Apr.docx
Samantha Chanel De Vera Posted Date Apr.docxSamantha Chanel De Vera Posted Date Apr.docx
Samantha Chanel De Vera Posted Date Apr.docx
 
Ruth milikan chapters 5 and 6 in her book varieties.docx
Ruth milikan chapters 5 and 6 in her book varieties.docxRuth milikan chapters 5 and 6 in her book varieties.docx
Ruth milikan chapters 5 and 6 in her book varieties.docx
 
Samantha Chanel De Vera Posted Date Mar.docx
Samantha Chanel De Vera Posted Date Mar.docxSamantha Chanel De Vera Posted Date Mar.docx
Samantha Chanel De Vera Posted Date Mar.docx
 
Russian Revolution Under Lenin and Trotsky.docx
Russian Revolution Under Lenin and Trotsky.docxRussian Revolution Under Lenin and Trotsky.docx
Russian Revolution Under Lenin and Trotsky.docx
 
Review the papers below and watch The Untold Story.docx
Review the papers below and watch The Untold Story.docxReview the papers below and watch The Untold Story.docx
Review the papers below and watch The Untold Story.docx
 
Samantha Chanel De Vera Posted Date May.docx
Samantha Chanel De Vera Posted Date May.docxSamantha Chanel De Vera Posted Date May.docx
Samantha Chanel De Vera Posted Date May.docx
 
Saudi Arabia.docx
Saudi Arabia.docxSaudi Arabia.docx
Saudi Arabia.docx
 
Right to Privacy.docx
Right to Privacy.docxRight to Privacy.docx
Right to Privacy.docx
 
Richard Rodriguez has generally been criticized by immigrant Identify.docx
Richard Rodriguez has generally been criticized by immigrant Identify.docxRichard Rodriguez has generally been criticized by immigrant Identify.docx
Richard Rodriguez has generally been criticized by immigrant Identify.docx
 

Recently uploaded

Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Additional Data Session Statistical Data Distinguish between full.docx

  • 1. Additional Data Analysis, Session Data, Statistical Data Distinguish between full Additional Data Analysis, Session Data, Statistical Data Distinguish between full content data (including collection tools), session data (including collection tools) and statistical data (including collection tools).Research the topics. I attached an example of a post below.Example:Good Evening,This week we are discussing the difference between full content data, session data, and statistical data. It’s important to first understand that security monitoring is an absolute must in every organization. When you have security monitoring in place, it allows the security department to gather, analyze and set up solutions to prevent any data breach.Full content data is the most flexible form of network- based information and probably the most important. It also provides the most information and details. Full content data allows you to narrow down on specific protocols and even IP addresses and the ability to slice and dice the data into so many different ways. “It provides granularity and application relevance, which means, granularity is the collection of every nuanced bit in a packet and application relevance refers to saving the information passed above the transport layer” (Bejtlich, 2004). A few tools are TCPdump, Libpcap, Tethereal, and Snort.Session data is a summary of a packet exchange between two systems. Session data include several core elements that includes source IP, source port, destination IP, destination port, timestamp, and can even measure the amount of information exchanged during a session. Session data collects everything and anything it sees, which makes tracking hackers possible. Some tools that can be used is Cisco’s NetFlow, Fprobe, and Ng_netflow.Statistical data is used to identify and validate intrusions. It allows you to review and summarize a collection of data in a clear way. Statistical data can be used to create a baseline and see what has been triggered. It allows you to have a better understanding of what is happening to the network. A few tools are cisco accounting, Ipcad, Ifstat, and Bmon.Thank you ????SamBejtlich, R. (2004). The Tao of Network Security Monitoring Beyond Intrusion Detection. Addison-Wesley Professional.