data-architecture-a

(coco) #1

Another interesting aspect of security is looking at who is trying to look at encrypted
data. The access and analysis of encryption may be purely innocent. Then, again, it may
not be innocent at all. By examining log tapes and seeing who is trying to access what
data, the analyst can determine if someone is trying to access data they shouldn’t be
looking at.


Fig. 9.3.6 shows that examining log tapes is a good practice in determining if there are
breaches of security.


Fig. 9.3.6 Who is looking at our encrypted data?

Filtering, Distillation


There are two basic kinds of processing that occur in the analysis of repetitive data—
distillation and filtering.


In distillation of data, repetitive records are selected and read. Then, the data are
analyzed, looking for average values, total values, exceptional values, and the like. After
the analysis has concluded, a single result is achieved and becomes the out-of-distillation
process.


Chapter 9.3: Repetitive Analysis
Free download pdf