Module 3 - 02-2 Flashcards
Explore security information and event management (SIEM) tools
What are the different types of SIEM tools an organizations can choose from, based on their unique security needs (3)?
- Self-hosted
- Cloud-hosted
- Hybrid solution
Briefly describe Self-hosted SIEM tool?
- Requires organizations to install, operate, and maintain the tool using their own physical infrastructure, such as server capacity
- Managed and maintained by the organization’s IT department, rather than a third party vendor
- Ideal when an organization is required to maintain physical control over confidential data
Briefly describe Cloud-hosted SIEM tool?
- Maintained and managed by the SIEM providers, making them accessible through the internet
- Ideal for organizations that don’t want to invest in creating and maintaining their own infrastructure
Briefly describe Hybrid solution?
- An organization can choose to use a combination of both self-hosted and cloud-hosted SIEM tools
- Leverage the benefits of the cloud while also maintaining physical control over confidential data
What are some common SIEM tools (3)?
- Splunk Enterprise
- Splunk Cloud
- Chronicle
What is Splunk?
A data analysis platform
What is Splunk Enterprise?
A self-hosted tool used to retain, analyze, and search an organization’s log data to provide security information and alerts in real-time
What is Splunk Cloud?
A cloud-hosted tool used to collect, search, and monitor log data
What is Chronicle?
Google’s Chronicle
A cloud-native tool designed to retain, analyze, and search data
Define Open-source tools
A software program with a source code that is freely available to anyone, and can be modified, distributed, and studied for any purpose
What is the objective of Open-source tools?
To provide users with software that is built by the public in a collaborative way, which can result in the software being more secure
The source code for open-source projects is readily available to users, as well as the training material that accompanies them.
What are examples of Open-source tools (2)?
- Linux
- Suricata
What is Linux?
An open-source operating system.
It allows you to tailor the operating system to your needs using a command-line interface.
Define Operating System
The interface between computer hardware and the user.
It’s used to communicate with the hardware of a computer and manage software applications.
What is Suricata?
An open-source network analysis and threat detection software
Briefly explain Network analysis and Threat detection software
Network analysis and threat detection software is used to inspect network traffic to identify suspicious behavior and generate network data logs. The detection software finds activity across users, computers, or Internet Protocol (IP) addresses to help uncover potential threats, risks, or vulnerabilities.