There is a huge range of cybersecurity products on the market, with many having overlapping or similar aims and capabilities. In this section, we looked at different network security technologies and the information that they capture.
Having a range of different data is vital in establishing what is being sent across the network and by whom. If we consider this in terms of previous chapters on evidence and attribution, the range of different data helps cybersecurity operators by providing corroboration to their interpretations.
Many systems provide decision making in isolation, although companies are increasingly providing suites of interconnected systems that can share information to make better decisions. However, there is always a risk of making incorrect decisions. Where a threat is incorrectly permitted, this is called a false negative; when legitimate traffic is...