StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Advanced Hunting and Content Development - Research Paper Example

Cite this document
Summary
Evidently, in an era characterized by big data and hacking, companies require the best tools, people, organizational focus, and people to benefit from the right capacities for data mining and acquisition of insights relevant facilitating better decisions and value creation…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Advanced Hunting and Content Development
Read Text Preview

Extract of sample "Advanced Hunting and Content Development"

Advanced Hunting and Content Development Synopsis of the Advanced Hunting and Content Development Evidently, in an era characterized by big data and hacking, companies require the best tools, people, organizational focus, and people to benefit from the right capacities for data mining and acquisition of insights relevant facilitating better decisions and value creation (Talabis, McPherson and Martin 3). For effective advanced hunting, companies are expected to use different tools or mechanisms to identify any malicious activity against their big data, and establish an automated tool for use in content development.

However, most skilled antagonists manage to access defenders’ tools and resources or to some extent evade such tools causing anomalies in big data or engaging in fraud. Attack or evading defenders’ tools involve using counter infrastructure and tools that compromise data. Defenders must then have indicators of compromise (IOC) such that their content identifies methods or numerous pieces of evidence (Orlando 23). This introduces the need to distinguish between analytic and hunting where analytics include the means of obtaining attractive objects, patterns, and events, and this is supported by hunting together with monitoring.

However, monitoring is not analytics, but ensuring that the system is free from evident or hidden compromise by offenders. In their attack, offenders use different platforms and phishing techniques while defenders are forced to use such as exploit kit servers such as RSA Security Analytics to monitor phishing and other attacks. RSA security analytics work toward protecting phishing, and suspicious objects, patterns or events using notifications such as warnings, provision of information, and curbing suspicions.

In all cases, RSA security analytics uses an event reconstruction to identify suspicions, warnings, or compromise, and communicates to the present security tools including intrusion prevention systems, and firewalls. The security tools are also informed of things that present threat to the system (Musthaler n.p).Security Analytic Tools The two identified are Zenoss Core, Network Miner, and angry IP Scanner. The Zenoss Core platform combines system management and integrated network analysis of performance, events, availability, and configuration.

The platform uses simple protocols for streaming data through SSH, JMX, and Syslong for flexible foundation to manage events and monitor logs. In addition, the tool offers features that are particularly geared towards virtual and cloud infrastructure. Network minor tool offers a great way of scrutinizing files, chat history, searching files, and identifying odd cookies and agents (Netresec n.p). The implication is that Networkminer is not about network traffic monitoring, but analysing network forensic for windows, while collecting data regarding the host network unlike its traffic.

The technique used involves sniffing for packets to ascertain that users are assisted in detecting OS, open ports, and host names within the network. The Angry IP Scanner relies on a scanning technique that uses multi-threaded scanning methods, thus offering speedy scans (Angry IP Scanner n.p). The results can be saved in the form of.txt, .csv, .xml, and list files for IP ports. Since the tool utilizes flexible java-based framework, it is easily extensible using plug-ins that gather additional information regarding scanned IPs.

Works CitedAnalytics and Content Development. Dir. Mark Orlando. 2013.Angry IP Scanner. What is it? 28 May 2015. .Musthaler, Linda. "Security analytics will be the next big thing in IT security." Network World 31 May 2013: xx.Netresec. Netresec Network Security Blog. 20 October 2014. .Talabis, Mark, Robert McPherson and Miyamoto Martin. Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data. London: Elsevier Science & Technology Books, 2014.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Advanced Hunting and Content Development Research Paper”, n.d.)
Retrieved from https://studentshare.org/information-technology/1696298-advanced-hunting-and-content-development
(Advanced Hunting and Content Development Research Paper)
https://studentshare.org/information-technology/1696298-advanced-hunting-and-content-development.
“Advanced Hunting and Content Development Research Paper”, n.d. https://studentshare.org/information-technology/1696298-advanced-hunting-and-content-development.
  • Cited: 0 times

CHECK THESE SAMPLES OF Advanced Hunting and Content Development

Exploring Acomplex Situation

Likely, such elements of culture are used to identify people regarding their lifestyle and how they are actually able to contribute to the development of the society at present.... This essay "Exploring Acomplex Situation" concentrates on how the worldview naturally refers to the understanding of the whole world as a natural part of social norms....
6 Pages (1500 words) Essay

Advanced Business Structure - Twitter

It was founded in March 2006 by Jack Dorsey, Biz Stone and Evan Williams, and the official launch in July 2006.... The first half of 2007 it had gained popularity among all types… A twitter is a person, a lot of people, a business or an event (Simon & Schuster, 71). A business model is a working report which includes the standard details about the operations of business (Damiani, Yetongnon, Chbeir & Dipada, 172)....
6 Pages (1500 words) Essay

What's your point of view

Technology, Globalization and Sustainable development: Transforming the Industrial State.... However, there are several debates which have come up in accordance to the appropriateness of the content that is acquired on internet and the video games with the relationship they have to obesity among children and adults.... However, such individuals console themselves by asserting that vast amounts of land and forests have been kept for people to experience the simplicity with which fishing, hunting, camping can bring....
2 Pages (500 words) Essay

Economic Strata in the Society

Paul Collier, a development economist refers these as the bottom billions.... It tempts to make an assumption that all books on issues related to global development seems to advance poverty alleviation theories to assist in poverty reduction in the Global south (Abhijit and Duflo 297).... Abhijit and Duflo have alienated their development concept on possible ways of reducing poverty in the global south through development of a modest premise outside the anti- foreign aid and pre- foreign aid discussions....
4 Pages (1000 words) Essay

Report of IT tech for food4all

The proposal incorporates LiveStream into the institution by in house development In the process of creating live video streams for service delivery sessions, the project uses teleconferencing facilities like overhead cameras, screens or projectors, and high speed Internet connectivity among other technologies that incorporate the application of chat features.... To advance professional services and development for employees handling Promethean Boards during service delivery....
4 Pages (1000 words) Essay

Hunting Methods of Early Man

The author states that Hunting developed gradually from time to time to make human beings arrive where they are now… The need for better methods of hunting greatly influenced the development of the brain.... This idea became possible because of the development of language that eased communication and understanding (Leakey 3).... The author of the paper describes the hunting methods used by early man, more specifically the Homo habilis, Homo erectus and the Neanderthal man....
5 Pages (1250 words) Research Paper

Building Analysis on Savil Building by Glen Howells Architects Located at the Great Park Windsor

The author of the paper "Building Analysis on Savil Building by Glen Howells Architects Located at the Great Park Windsor" will begin with the statement that beauty or the aesthetic value of every building is an important feature of every structure established within certain locations.... hellip; It could be observed that concerning Savil Building, the aesthetic of presentation of the building actually got along well with the location where it has been situated....
7 Pages (1750 words) Case Study

The PC: 35 Years and Counting

Nonetheless, as PC technology gradually advanced, so did the gaming technology.... … The paper “35 Years and Counting - Technological Advances of the PC That Have Affected the Application of Computers in Games” is a perfect example of an essay on information technology....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us