Network Security Monitoring
Network Security Monitoring data: Types I, II, and III
This blog post explains three levels of analysis and how encryption has affected NSM, demonstrating that NSM remains relevant, despite encryption.