Revision history of "Use of network analysis techniques to prevent data loss" (Q10660)

Jump to navigation Jump to search

Diff selection: Mark the radio buttons of the revisions to compare and hit enter or the button at the bottom.
Legend: (cur) = difference with latest revision, (prev) = difference with preceding revision, m = minor edit.

20 March 2024

15 January 2024

6 July 2023

11 June 2023

17 February 2023

2 July 2022

  • curprev 13:3013:30, 2 July 2022DG Regio talk contribs 49,990 bytes +29,286 Changed label, description and/or aliases in da, el, hr, ro, sk, mt, pt, fi, pl, sl, lt, lv, bg, hu, ga, sv, et, cs, nl, fr, de, it, es, and other parts: Adding translations: da, el, hr, ro, sk, mt, pt, fi, pl, sl, lt, lv, bg, hu, ga, sv, et,

15 January 2022

14 January 2022

13 December 2021

2 December 2021

  • curprev 07:5207:52, 2 December 2021DG Regio talk contribs 16,101 bytes +1,409 Created claim: summary (P836): Netzwerkflussanalysetechnologie ist jetzt sehr entwickelt und dient in erster Linie für die externe Sicherheit – Erkennung von Malware, Botnets oder Hacker-Angriffen. Diese Verfahren basieren oft auf fortgeschrittenen statistischen Modellen. Verfahren zur Verhinderung von Datenverlusten nicht über die Netzwerkdatensätze, sondern über die Arbeit und die Bewegung von Dateien im Unternehmen. Ziel ist es, zu überprüfen, ob Netzanalysetechniken nicht...
  • curprev 07:5207:52, 2 December 2021DG Regio talk contribs 14,692 bytes +129 Changed label, description and/or aliases in de: translated_label

28 November 2021

  • curprev 08:5908:59, 28 November 2021DG Regio talk contribs 14,563 bytes +1,512 Created claim: summary (P836): La technologie d’analyse de flux réseau est maintenant très développée et sert principalement à la sécurité externe — détection de logiciels malveillants, de botnets ou d’attaques de pirates informatiques. Ces procédures sont souvent basées sur des modèles statistiques avancés. Procédures visant à prévenir la perte de données travail non pas sur les enregistrements réseau, mais sur le travail et le déplacement des fichiers dans l’entreprise. L’o...
  • curprev 08:5908:59, 28 November 2021DG Regio talk contribs 13,051 bytes +140 Changed label, description and/or aliases in fr: translated_label

28 October 2020

22 October 2020

  • curprev 15:1815:18, 22 October 2020DG Regio talk contribs 13,356 bytes +1,314 Created claim: summary (P836): Network flow analysis technology is currently highly developed and serves primarily for external security – detection of malware, botnets or hacker attacks. These procedures are often based on advanced statistical models. Procedures aimed at preventing data loss work not over network records, but on the work and movement of files in the company. The aim is to verify whether network analysis techniques cannot be modified to detect non-standard da...
  • curprev 15:1815:18, 22 October 2020DG Regio talk contribs 12,042 bytes −888 Removed claim: summary (P836): The network flow analysis technologies are now highly developed and primarily serve the purpose of external security — the detection of malware, botnets or hacking. These procedures are often based on advanced statistical models. The procedures to prevent the loss of data work do not work over the network records, but the work and movement of files at the firm. The objective is to verify that network analysis techniques cannot be modified to d...
  • curprev 07:1107:11, 22 October 2020DG Regio talk contribs 12,930 bytes +114 Changed label, description and/or aliases in 1 language: translated_label
  • curprev 07:1107:11, 22 October 2020DG Regio talk contribs 12,816 bytes −118 Changed label, description and/or aliases in 1 language: remove_english_label

24 September 2020

22 September 2020

15 July 2020

6 June 2020

25 March 2020

19 March 2020

25 February 2020

  • curprev 16:3216:32, 25 February 2020DG Regio talk contribs 11,670 bytes +888 Created claim: summary (P836): The network flow analysis technologies are now highly developed and primarily serve the purpose of external security — the detection of malware, botnets or hacking. These procedures are often based on advanced statistical models. The procedures to prevent the loss of data work do not work over the network records, but the work and movement of files at the firm. The objective is to verify that network analysis techniques cannot be modified to det...

17 February 2020

11 February 2020

6 February 2020

30 January 2020

28 January 2020

16 January 2020

10 January 2020