Academy and Foundation unixmens | Your skills, Your future
2.3K subscribers
6.68K photos
1.39K videos
1.24K files
6.19K links
@unixmens_support
@yashar_esm
[email protected]
یک کانال علمی تکنولوژی
فلسفه متن باز-گنو/لینوکس-امنیت - اقتصاد
دیجیتال
Technology-driven -بیزینس های مبتنی بر تکنولوژی
Enterprise open source
ارایه دهنده راهکارهای ارتقای سازمانی - فردی - تیمی
Download Telegram
What is SIM?

Security Information Management (SIM) involves collecting log files and storing them in a central repository for analysis, also known as log management. SIM solutions are typically agent-based, with software on servers and computers transmitting log and security information to a central SIM server. System administrators use this server to run security reports, graphs, and charts in real time. Some SIM systems filter and normalize logs before sending them to reduce network congestion and disk space usage without hindering the recreation of system states during security incidents.
What is SEM?

Security Event Management (SEM) focuses on identifying, gathering, monitoring, evaluating, and correlating system events and alerts. SEM enhances SIM by analyzing data relayed from hosts to a central repository using protocols like SNMP and syslog. This centralization allows for the identification of significant events, alerting administrators to activities such as off-hours logins. SEM tools analyze threats and vulnerabilities, providing immediate notifications for critical events.
What is SIEM?

Security Information and Event Management (SIEM) combines SIM and SEM capabilities to collect, organize, and analyze security-related activities across an organization's infrastructure. SIEM tools aggregate real-time and historical data from various sources like routers, servers, antivirus software, and firewalls. They use predefined analytical rules to detect threats and suspicious activities, aiding in security and compliance with regulations like GDPR, HIPAA, PCI-DSS, and SOX. SIEMs also help in resource capacity management by tracking data growth and bandwidth usage.
How Does a SIEM Work?

A SIEM tool is a data aggregation, search, and reporting system that:

Data Collection: Deploys agents on equipment and security systems for data collection.
Data Storage: Stores event, alert, and log information centrally, supporting both on-premises and cloud storage for scalability.
Security Rules and Policies: Allows administrators to define security baselines and thresholds, increasingly using machine learning for anomaly detection.
Data Correlation and Consolidation: Correlates events and logs across systems to provide a comprehensive understanding of security events.

Choosing a SIEM Solution – What to Look For

When selecting a SIEM, consider:

Licensing: Understand the vendor's licensing model—whether based on the number of devices or events captured.
Scalability: Ensure easy upgrade paths for future growth.
Log Compatibility: Confirm the SIEM can read and normalize data from various systems and facilitate testing in your environment.
Event and Log Search: Look for powerful search capabilities across logs, devices, and timeframes.
Dashboard and Reporting: Ensure customizable dashboards and reports that display real-time event information intuitively.

#security #linux #siem #sem #sim #soc

https://t.iss.one/unixmens
2👍1
کتابی که در حوزه امنیت نوشتم . تقدیم بر جامعه متن باز

امیدوارم این کتاب کمکی باشه برای ارتقا امنیت سرزمینم و جهان

پذیرای نظرات ارزشمندتان در مورد این کتاب ۴۶۱ صفحه ای هستم .

باتشکرات فراوان

نکته : نوشتن این کتاب را از سال های پیش شروع کردم . شاید برخی از بخش ها بعضی عکس ها قدیمی باشه .

#yashar_esmaildokht #linux #security #waf #siem #book


https://www.slideshare.net/yasharesmaildokht/security-book-251632472