Understanding stream processing
The software applications that are deployed in the enterprise have two basic components:
- The infrastructure
- The applications
The infrastructure includes the physical hardware and the network that connects different systems together. The security implementation for infrastructure and applications have different considerations due to which the frameworks and processes for protecting the CI are also different.
The security systems need to operate across the peripheries of the infrastructure and within the applications. There are various events through which the data (network and application) flows. The events take place at a point in time and the corresponding data is available for analysis and action immediately after the event occurs.
For example, a client application such as a web browser requests access to a website over the HTTP protocol. The sequence of events are initiated right after the URL is entered through the browser. The related analysis based on the...