CST 610 Project 2
Cyberspace and Cybersecurity Foundations
Security Detective Monitoring Data Analysis
Template
Prepared By: Firstname Lastname
Version 1.0
Table of Contents
Introduction............................................................................................................................3
Objectives.......................................................................................................................................3
Definitions.......................................................................................................................................3
Predictions......................................................................................................................................3
Methodology...................................................................................................................................3
Reflections......................................................................................................................................3
Introduction
[Summarize the purpose of doing this work]
Objectives
1. Prepare to assess FICBANK’s security monitoring infrastructure.
2. Conduct a preliminary security monitoring data analysis.
Definitions
[List key terms FICBANK leadership needs to know to understand this report and provide
definitions based on your reading]
Predictions
Document the predictions you made before starting the hands-on activity here.
1. What kinds of information do you think will be in the log file(s)?
2. What information might not be in the log file(s)?
3. What tools, techniques, and practices might be best suited to analyzing security
monitoring data?
Methodology
[Provide an answer to each question in the hands-on instructions along with evidence of your
practice work]
Reflections
Provide a thorough and critical analysis for each of the following questions. Everyone must
answer the General questions. If you want a challenge, take on the Technical questions too!
General:
1. What tools did you use to collect and query security monitoring data?
2. What data sources did you analyze during the project?
3. How did you validate the accuracy of the security monitoring data?
4. What challenges did you face when analyzing the security monitoring data?
Technical:
1. What insights did you gain about the types of attacks that FICBANK may face based on
the security monitoring data analysis?
2. How did you approach identifying patterns and anomalies in the security monitoring
data?
3. What methodologies did you use to conduct the practice analysis of the security
monitoring data?