What are the different types of SIEM tools an organizations can choose from, based on their unique security needs (3)?
Briefly describe Self-hosted SIEM tool?
Briefly describe Cloud-hosted SIEM tool?
Briefly describe Hybrid solution?
What are some common SIEM tools (3)?
What is Splunk?
A data analysis platform
What is Splunk Enterprise?
A self-hosted tool used to retain, analyze, and search an organization’s log data to provide security information and alerts in real-time
What is Splunk Cloud?
A cloud-hosted tool used to collect, search, and monitor log data
What is Chronicle?
Google’s Chronicle
A cloud-native tool designed to retain, analyze, and search data
Define Open-source tools
A software program with a source code that is freely available to anyone, and can be modified, distributed, and studied for any purpose
What is the objective of Open-source tools?
To provide users with software that is built by the public in a collaborative way, which can result in the software being more secure
The source code for open-source projects is readily available to users, as well as the training material that accompanies them.
What are examples of Open-source tools (2)?
What is Linux?
An open-source operating system.
It allows you to tailor the operating system to your needs using a command-line interface.
Define Operating System
The interface between computer hardware and the user.
It’s used to communicate with the hardware of a computer and manage software applications.
What is Suricata?
An open-source network analysis and threat detection software
Briefly explain Network analysis and Threat detection software
Network analysis and threat detection software is used to inspect network traffic to identify suspicious behavior and generate network data logs. The detection software finds activity across users, computers, or Internet Protocol (IP) addresses to help uncover potential threats, risks, or vulnerabilities.
What foundation developed Suricata?
Open Information Security Foundation (OISF)
What does OISF stand for?
Open Information Security Foundation (OISF)
Define Proprietary tools
Developed and owned by a person or company, and users typically pay a fee for usage and training.
The owners of proprietary tools are the only ones who can access and modify the source code.
This means that users generally need to wait for updates to be made to the software, and at times they might need to pay a fee for those updates.
What are examples of Proprietary tools (2)?
What are the Splunk SIEM tool Dashboards (4)?
What is the purpose of the Security posture dashboard?
The security posture dashboard is designed for security operations centers (SOCs). It displays the last 24 hours of an organization’s notable security-related events and trends and allows security professionals to determine if security infrastructure and policies are performing as designed. Security analysts can use this dashboard to monitor and investigate potential threats in real time, such as suspicious network activity originating from a specific IP address.
What is the purpose of the Executive summary dashboard?
The executive summary dashboard analyzes and monitors the overall health of the organization over time. This helps security teams improve security measures that reduce risk. Security analysts might use this dashboard to provide high-level insights to stakeholders, such as generating a summary of security incidents and trends over a specific period of time.
What is the purpose of the Incident review dashboard?
The incident review dashboard allows analysts to identify suspicious patterns that can occur in the event of an incident. It assists by highlighting higher risk items that need immediate review by an analyst. This dashboard can be very helpful because it provides a visual timeline of the events leading up to an incident.