Analyzing the Results of Reconnaissance
This chapter includes questions on the following topics:
• Sources of data to consider in your analysis
• Point-in-time data analysis
• Data correlation and analysis
• Common tools used in security analytics
In the prior chapter, you applied tools and techniques to conduct reconnaissance. Benefiting from reconnaissance takes more than just collecting information. To benefit, you need to both collect and analyze that information. The analysis is what changes the collected data into something useful—something that helps the security analyst identify and measure what an attacker would consider as targets.
Careful analysis involves a variety of sources and methods. Sources include various ...