From the course: Data-Driven Network Security Essentials

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Visualization steps

Visualization steps

From the course: Data-Driven Network Security Essentials

Start my 1-month free trial

Visualization steps

- [Instructor] To avoid an ineffective visualization that causes misunderstanding and confusion it's crucial to follow a step-by-step process to produce an informative and useful interpretation of raw data. The very first step is to decide on your requirements. This is also referred to as the problem phase. What story are you trying to tell about your net of security? Are you seeking to gain more insight on connection attempts to a secure shell server from different clients by their country of origin, or are you interested in knowing the volume of incoming or outgoing network traffic through your router? The second step is to think about the data we need to meet the requirements or to answer the questions formulated during the problem definition phase. Do we have sufficient data? Are firewall logs what we should look at? Or should we be looking at something else? In our secure shell server example, it turns out that we need the firewall logs as well as secure server log files. The…

Contents