Information has value and as such any network based computer (whether that network touches
the Internet or not) has the potential to be hacked. Telemetry data is not immune to the threat.
While there are a myriad of security sensor and analytics tools available for entities to deploy in
order to protect their IT networks and assets on those networks, sometimes overlooked is also the
wealth of research data available regarding the etiology of breaches that reveal fascinating,
sometimes counterintuitive insights in the best ways to configure and integrate security
applications to protect the organization.
After reviewing the latest research data regarding computer and IT network compromise,
security strategies implied in the research data appropriate to the security challenges
encountered in the telemetry post processing environment will be thoroughly examined
providing tangible methodologies that may be employed to better protect organization telemetry
post processing and IT infrastructures.
Identifer | oai:union.ndltd.org:arizona.edu/oai:arizona.openrepository.com:10150/624239 |
Date | 11 1900 |
Creators | Kalibjian, Jeff |
Contributors | Hewlett Packard Enterprise |
Publisher | International Foundation for Telemetering |
Source Sets | University of Arizona |
Language | en_US |
Detected Language | English |
Type | text, Proceedings |
Rights | Copyright © held by the author; distribution rights International Foundation for Telemetering |
Relation | http://www.telemetry.org/ |
Page generated in 0.0016 seconds