What is a Lookback Option?

Back analysis is an analysis of the original decision when tracking the decision. One of the characteristics of tracking decisions. The tracking decision is made after the original decision has been implemented, and the situation has changed greatly during the implementation, and the decision must be made again. Therefore, the tracking decision should be objectively analyzed in terms of the original decision's mechanism and environment. Find out the origin of the original decision error and investigate its causes, find out the reasonable factors in the original decision, so that the tracking decision is based on the correct reality. [1]

Back analysis

This entry lacks an overview map . Supplementing related content makes the entry more complete and can be upgraded quickly. Come on!
Back analysis is an analysis of the original decision when tracking the decision. One of the characteristics of tracking decisions. The tracking decision is made after the original decision has been implemented, and the situation has changed greatly during the implementation, and the decision must be made again. Therefore, the tracking decision should be objectively analyzed in terms of the original decision's mechanism and environment. Find out the origin of the original decision error and investigate its causes, find out the reasonable factors in the original decision, so that the tracking decision is based on the correct reality. [1]
Network-wide communication records and monitoring, proactively discover network value space and potential network risks.
Establish the association index of network communication data, high-precision and deep mining of massive data, and long-term trend statistics.
The reorganization, restoration and reproduction of network events are used for security event forensics and network problem prevention.
The continuous, efficient and secure operation of the network is the basis for the normal operation of the user's business. This requires network managers to be able to grasp key indicators of business application operation at any time, detect abnormalities in time and provide early warning, and implement active operation and maintenance and management. When faults occur, they can quickly and effectively locate problem points, clarify responsibilities, and analyze the cause. Reduce downtime; once the network receives an attack or a security event, it needs to have the means and basis to effectively locate, analyze, and obtain evidence.
1. Long-term data storage
With long-term and large-capacity data storage capabilities, it can capture various statistical data such as raw data packets, data streams, network sessions, and application logs in real time and save them for a long time. It also provides line-speed analysis and processing capabilities for users' important network traffic.
2. Retrospective forensics capabilities
Ability to quickly trace back stored mass data. When the storage capacity allows, it has a retrospective analysis of network behavior, application data and host communication data that has occurred in the past 40 days, provides users with tracking and forensics of network problems, and supports download and analysis of related raw data.
3. Big data mining capabilities
Provides the ability to quickly retrieve and mine massive data in any period of time, so that users can use big data analysis by means of data association, filtering, mining and analysis in complex massive data. The system comes with powerful filtering conditions, which can help users to extract problems and extract related content to the greatest extent, and provide a more comprehensive analysis method for quickly locating the cause of problems.
4, Layer 7 protocol decoding
The system provides decoding and analysis capabilities for various network communication protocols that are common on the Internet to help users see the communication status at all levels of the network.
5. Intelligent analysis (data flow, expert analysis, security analysis)
The powerful intelligent analysis module can intelligently analyze network faults at various layers, reorganize application data, and provide a graphical visual view of data flow interaction, which is convenient for users to quickly diagnose network and application faults.
6. Safety analysis
Provides intelligent diagnosis for security events such as worms, DoS attacks, ARP attacks, and TCP port scanning to quickly locate problem hosts.
7. Application access records
Provides detailed logging functions for common Internet application user access behaviors to facilitate accurate analysis of user Internet access behaviors.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?