CHAPTER 12Intrusion Data Analysis

Objectives

Upon completion of this chapter, you will be able to answer the following questions:

  • What is the structure of alerts?

  • How are alerts classified?

  • How is data prepared for use in a network security monitoring (NSM) system?

  • How do you use Security Onion tools to investigate network security events?

  • Which network monitoring tools enhance workflow management?

  • What is the role of the digital forensic processes?

Key Terms

This chapter uses the following key terms. You can find the definitions in the Glossary.

CapME page 543

OSSEC page 544

Suricata page 544

ELSA page 544

true positive page 551

false positive page 551

true negative page 552

false negative page 552

deterministic analysis page 553

probabilistic ...

Get CCNA Cybersecurity Operations Companion Guide, First Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.