4B. Analyse and Query logs and SIEM data obj 3.1 Flashcards

1
Q

Heuristic-based analysis

A

A method that uses feature comparisons and likenesses rather than specific signature matching to identify whether the target of observation is malicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Behaviour-based analysis

A

A network monitoring system that detects changes in normal operating activity and identifies abnormal activity. Uses heuristics to generate a statistical model of what the baseline looks like

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anomaly-based analysis

A

the process of defining an expected outcome or pattern to events, and then identifying any events that do not follow these patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Trend analysis

A

process of detecting patterns within a dataset over time and using those patterns to make predictions about future events. Can help to judge that specific events over time are related and possibly indicate that an attack is imminent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

awk

A

The feature awk is a scripting engine geared toward modifying and extracting data from files or data streams, which can be useful in preparing data for analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly