Security Information and Event Management (SIEM) Implementation
Samenvatting
Deze gids helpt u bij het management van beveiligingen in uw netwerk. Het laat zien hoe u SIEM-techonologie inzet om beveiligingsrisico's te monitoren, identificeren en te documenteren. Bovendien laat het zien hoe u op een beveiligingsrisico kunt reageren.
Specificaties
Inhoudsopgave
Chapter 1 Business Models
Chapter 2 Threat Models
Chapter 3 Regulatory Compliance
Part II: IT Threat Intelligence Using SIEM Systems
Chapter 4 SIEM Concepts - Components for small and medium size businesses
Chapter 5 The Anatomy of a SIEM
Chapter 6 Incident Response
Chapter 7 Using SIEM for Business Intelligence
Part III: SIEM Tools
Chapter 8 AlienVault OSSIM Implementation
Chapter 9 AlienVault OSSIM Operation
Chapter 10 Cisco Security-MARS Implementation
Chapter 11 Cisco Security-MARS Advanced Techniques
Chapter 12 Q1 Labs QRadar Implementation
Chapter 13 Q1 Labs QRadar Advanced Techniques
Chapter 14 ArcSight Implementation
Chapter 15 ArcSight ESM Advanced Techniques
Appendix: The Ways and Means of the Security Analyst