[go: up one dir, main page]

0% found this document useful (0 votes)
105 views3 pages

Project 2 - Security Monitoring Data Analysis Template

Project 2 - Security Monitoring Data Analysis Template

Uploaded by

maryjoy.williams
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
105 views3 pages

Project 2 - Security Monitoring Data Analysis Template

Project 2 - Security Monitoring Data Analysis Template

Uploaded by

maryjoy.williams
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

CST 610 Project 2

Cyberspace and Cybersecurity Foundations

Security Detective Monitoring Data Analysis


Template
Prepared By: Firstname Lastname

Version 1.0
Table of Contents
Introduction............................................................................................................................3
Objectives.......................................................................................................................................3
Definitions.......................................................................................................................................3
Predictions......................................................................................................................................3
Methodology...................................................................................................................................3
Reflections......................................................................................................................................3
Introduction
[Summarize the purpose of doing this work]

Objectives
1. Prepare to assess FICBANK’s security monitoring infrastructure.
2. Conduct a preliminary security monitoring data analysis.

Definitions

[List key terms FICBANK leadership needs to know to understand this report and provide
definitions based on your reading]

Predictions
Document the predictions you made before starting the hands-on activity here.
1. What kinds of information do you think will be in the log file(s)?
2. What information might not be in the log file(s)?
3. What tools, techniques, and practices might be best suited to analyzing security
monitoring data?

Methodology

[Provide an answer to each question in the hands-on instructions along with evidence of your
practice work]

Reflections
Provide a thorough and critical analysis for each of the following questions. Everyone must
answer the General questions. If you want a challenge, take on the Technical questions too!

General:

1. What tools did you use to collect and query security monitoring data?
2. What data sources did you analyze during the project?
3. How did you validate the accuracy of the security monitoring data?
4. What challenges did you face when analyzing the security monitoring data?

Technical:

1. What insights did you gain about the types of attacks that FICBANK may face based on
the security monitoring data analysis?
2. How did you approach identifying patterns and anomalies in the security monitoring
data?
3. What methodologies did you use to conduct the practice analysis of the security
monitoring data?

You might also like