Analytics

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/38

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

39 Terms

1
New cards
What is cybersecurity analytics?

the application of intelligent data analysis, data mining, and artificial intelligence techniques to analyse cybersecurity problems.

2
New cards
What areas can cybersecurity analytics be applied to?

The entire Cyberspace Operating Environment.

3
New cards
What is the Cyberspace Operating Environment?

The internet, considered as an imaginary, limitless area where people can meet and access any kind of information.

  • A global domain consisting of interdependent IT infrastructures and resident data, including the internet, telecom networks, computer systems, and embedded processors/controllers.

4
New cards
What are the pros of cyberspace?

It enables new opportunities for e-commerce, wider outreach, more efficient business processes, and remote work (WFH).

5
New cards
What are the cons of cyberspace?

It opens a new arena for crime such as online banking fraud, hacking, stalking, identity theft, and malware.

6
New cards
What are the layers that make up cyberspace?
  • Social — collective and group interaction.

  • People — the actors.

  • Persona — narrative identity.

  • Information — the sources.

  • Network — connectivity infrastructure.

  • Real world — physical dimension of cyberspace.

7
New cards
What are the three domains of cyberspace?
  • Cognitive

  • Virtual

  • Physical

8
New cards

what is the cognitive domain of cyberspace

represents the community, including social, people, and persona layers.

9
New cards

what is the virtual domain of cyberspace

includes software and virtual connections between networks and nodes.

10
New cards

what is the physical domain of cyberspace

the tangible, real-world infrastructure like cables, computers, and hardware.

11
New cards
How does cyberspace relate to cybersecurity analytics?

Each layer and domain within cyberspace generates data that can be collected and analysed using cybersecurity analytics.

12
New cards
Why do organisations need cybersecurity analytics?
  • Optimisation.

  • Legal requirements.

  • Strategic value.

  • Prediction.

  • Situational awareness.

13
New cards
Why is optimisation important in cybersecurity analytics?

It provides insight into asset values, allowing better resource planning and improved efficiency—not just detecting attacks.

14
New cards
Why are legal requirements important in cybersecurity analytics?

Organisations must comply with government regulations, using analytics for auditing, internal investigations, and law enforcement.

15
New cards
Why is strategic value important in cybersecurity analytics?

Analytics helps define and track Key Performance Indicators (KPIs) and supports strategic planning through informed risk management, aligning with Board Vision.

16
New cards
Why is prediction important in cybersecurity analytics?

It allows organisations to anticipate future attacks based on past events, improving resilience and preparation.

  • mitigate in advanced

  • reduce the impact of costly attacks

  • identify vulnerabilities

17
New cards
Why is situational awareness important in cybersecurity analytics?

It helps identify ongoing attacks and their targets, enabling better decision-making during specific situations.

  • intelligence

  • intrustion detection

  • current status

18
New cards
What types of data sources can be analysed with cybersecurity analytics?
  • Network monitoring logs.

  • Host logs.

  • Physical logs.

  • Employee activity.

  • Suppliers.

  • Customers.

  • OSINT (Open Source Intelligence).

19
New cards
Why are network monitoring logs important in cybersecurity analytics?

They show whether the network is operating securely and can reveal hints of cyberattacks.

  • firewall

  • access control

20
New cards
Why are host logs valuable for cybersecurity analytics?

They contain records from machines and terminals that can reveal abnormal or suspicious activity.

  • logins

  • event and application data

  • antivirus

21
New cards
Why should physical logs be considered in cybersecurity analytics?

They provide data from physical security systems which can correlate with digital threats.

  • CCTV

  • swipe card access

  • biometrics

22
New cards
Why is employee data relevant for cybersecurity analytics?

Employees may intentionally or unintentionally pose risks, and suspicious behaviour (e.g. on social media) can be an early indicator.

  • social media

23
New cards
Why are suppliers a cybersecurity concern in analytics?

External organisations may introduce vulnerabilities that need to be monitored.

  • supply chain agreements

24
New cards
Why is customer data considered in cybersecurity analytics?

Customers can unknowingly interact with malicious content or introduce security risks through compromised accounts.

  • social media

  • reviews

25
New cards
What is OSINT in cybersecurity analytics?

Open Source Intelligence like the MITRE ATT&CK framework, which helps compare internal data against known threat patterns.

  • media

  • law enforcements

  • regulators

  • academic publications

26
New cards
What are examples of specific data sources used in cybersecurity analytics?
  • Network architecture

  • Network scans.

  • Firewall logs.

  • IDS logs.

  • PCAP.

  • Server/system logs. - Geographical data. - Social media.

27
New cards
Why is network architecture important for analytics?
It maps assets and connectivity, helps track attack evolution, and supports segmentation to block host-hopping.
28
New cards
Why are network scans useful in cybersecurity analytics?
They help identify potential weak spots in the infrastructure.
29
New cards
Why are firewall logs important in cybersecurity analytics?
They show who tried to exploit a service and reveal which IP or system was targeted.
30
New cards
Why are IDS logs valuable in cybersecurity analytics?
They record abnormal behaviour patterns, helping identify possible attacks.
31
New cards
What is PCAP and why is it important in cybersecurity?
Packet capture data shows detailed information about network traffic for in-depth analysis.
32
New cards
Why are server and system logs used in cybersecurity analytics?
They contain detailed records of system events which may indicate unauthorised activity.
33
New cards
Why is geographical information useful in cybersecurity analytics?
Unusual login locations may reveal suspicious activity or compromised accounts.
34
New cards
Why is social media a useful data source in cybersecurity analytics?
It can reveal insider threats, such as disgruntled employees with a motive.
35
New cards
What considerations must experts take when conducting cybersecurity data analysis?
  1. Know the analysis techniques.

  2. Understand the data type.

  3. Manage data practicalities.

  4. Prepare for uncertainties.

36
New cards
What techniques should cybersecurity analysts be familiar with?
  • live or historic analysis

  • diagnostic or predictive

  • the focus of the analytical approach

37
New cards
What data characteristics must be considered in cybersecurity analytics?
  • Data quality and reliability.

  • Granularity.

  • Whether the dataset is big or small.

38
New cards
What are practical concerns in cybersecurity data analysis?
  • Pre-processing the data (e.g., Feature Selection).

  • Data storage.

  • Data protection.

39
New cards
Why must cybersecurity analysts prepare for uncertainties?
Data can be incomplete or inconsistent, and methods may require adjustment based on evolving threats.