Use of network analysis techniques to prevent data loss (Q10660): Difference between revisions
Jump to navigation
Jump to search
(Removed claim: summary (P836): The network flow analysis technologies are now highly developed and primarily serve the purpose of external security — the detection of malware, botnets or hacking. These procedures are often based on advanced statistical models. The procedures to prevent the loss of data work do not work over the network records, but the work and movement of files at the firm. The objective is to verify that network analysis techniques cannot be modified to d...) |
(Created claim: summary (P836): Network flow analysis technology is currently highly developed and serves primarily for external security – detection of malware, botnets or hacker attacks. These procedures are often based on advanced statistical models. Procedures aimed at preventing data loss work not over network records, but on the work and movement of files in the company. The aim is to verify whether network analysis techniques cannot be modified to detect non-standard da...) |
||||||||||||||
Property / summary | |||||||||||||||
Network flow analysis technology is currently highly developed and serves primarily for external security – detection of malware, botnets or hacker attacks. These procedures are often based on advanced statistical models. Procedures aimed at preventing data loss work not over network records, but on the work and movement of files in the company. The aim is to verify whether network analysis techniques cannot be modified to detect non-standard data work to identify data security risks. a. (English) | |||||||||||||||
Property / summary: Network flow analysis technology is currently highly developed and serves primarily for external security – detection of malware, botnets or hacker attacks. These procedures are often based on advanced statistical models. Procedures aimed at preventing data loss work not over network records, but on the work and movement of files in the company. The aim is to verify whether network analysis techniques cannot be modified to detect non-standard data work to identify data security risks. a. (English) / rank | |||||||||||||||
Normal rank | |||||||||||||||
Property / summary: Network flow analysis technology is currently highly developed and serves primarily for external security – detection of malware, botnets or hacker attacks. These procedures are often based on advanced statistical models. Procedures aimed at preventing data loss work not over network records, but on the work and movement of files in the company. The aim is to verify whether network analysis techniques cannot be modified to detect non-standard data work to identify data security risks. a. (English) / qualifier | |||||||||||||||
point in time: 22 October 2020
|
Revision as of 15:18, 22 October 2020
Project in Czech Republic financed by DG Regio
Language | Label | Description | Also known as |
---|---|---|---|
English | Use of network analysis techniques to prevent data loss |
Project in Czech Republic financed by DG Regio |
Statements
247,499.87 Czech koruna
0 references
329,999.83 Czech koruna
0 references
75.0 percent
0 references
28 April 2017
0 references
30 November 2017
0 references
1 December 2017
0 references
Safetica Services s.r.o.
0 references
13000
0 references
Technologie analýzy síťového toku je v dnešní době velmi rozvinutá a slouží primárně k externí bezpečnosti - odhalování malware, botnetů či útoků hackerů. Tyto postupy jsou často založeny na pokročilých statistických modelech. Postupy zaměřené na prevenci ztráty dat pracují nepracují nad záznamy o síti, ale o práci a pohybu souborů ve firmě. Cílem je ověřit, zda nelze upravit techniky síťové analýzy tak, aby odhalovany nestandardní práci s daty a identifikovali tak datová bezpečnostní rizika. a. (Czech)
0 references
Network flow analysis technology is currently highly developed and serves primarily for external security – detection of malware, botnets or hacker attacks. These procedures are often based on advanced statistical models. Procedures aimed at preventing data loss work not over network records, but on the work and movement of files in the company. The aim is to verify whether network analysis techniques cannot be modified to detect non-standard data work to identify data security risks. a. (English)
22 October 2020
0 references
Identifiers
CZ.01.1.02/0.0/0.0/16_045/0009614
0 references