Discuss the importance of the security principle of collection and correlation. Identify some important sources from which information needs to be collected in the context of national and critical infrastructure protection.
Also, identify the four distinct analytic methods that are available for the correlation of cyber security information.
Provide examples and identify challenges that are involved in collection and correlation.
You must do the following:
1) Create a new thread and share your perspectives with examples and references to course material
2) Select AT LEAST 2 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread.
ALL original posts and comments must be substantive