Security Information and Event Management Tools
Security Information and Event Management Tools
or SIEM tools.
A SIEM tool is an application that collects and
analyzes log data to monitor
critical activities in an organization.
The acronym S-I-E-M may be pronounced as 'sim' or 'seem',
but we'll use 'sim' throughout this program.
SIEM tools collect real-time, or instant, information,
and allow security analysts to
identify potential breaches as they happen.
A SIEM tool is an application that collects and analyzes log data to monitor critical activities in an
organization. A log is a record of events that occur within an organization’s systems. Depending
on the amount of data you’re working with, it could take hours or days to filter through log data on
your own. SIEM tools reduce the amount of data an analyst must review by providing alerts for
specific types of threats, risks, and vulnerabilities.
SIEM tools provide a series of dashboards that visually organize data into categories, allowing
users to select the data they wish to analyze. Different SIEM tools have different dashboard
types that display the information you have access to.
SIEM tools also come with different hosting options, including on-premise and cloud.
Organizations may choose one hosting option over another based on a security team member’s
expertise. For example, because a cloud-hosted version tends to be easier to set up, use, and
maintain than an on-premise version, a less experienced security team may choose this option
for their organization.
Playbooks
A playbook is a manual that provides details about any operational action, such as how to
respond to a security incident. Organizations usually have multiple playbooks documenting
processes and procedures for their teams to follow. Playbooks vary from one organization to the
next, but they all have a similar purpose: To guide analysts through a series of steps to complete
specific security-related tasks.
For example, consider the following scenario: You are working as a security analyst for an
incident response firm. You are given a case involving a small medical practice that has suffered
a security breach. Your job is to help with the forensic investigation and provide evidence to a
cybersecurity insurance company. They will then use your investigative findings to determine
whether the medical practice will receive their insurance payout.
In this scenario, playbooks would outline the specific actions you need to take to conduct the
investigation. Playbooks also help ensure that you are following proper protocols and
procedures. When working on a forensic case, there are two playbooks you might follow:
• The first type of playbook you might consult is called the chain of custody playbook.
Chain of custody is the process of documenting evidence possession and control during
an incident lifecycle. As a security analyst involved in a forensic analysis, you will work
with the computer data that was breached. You and the forensic team will also need to
document who, what, where, and why you have the collected evidence. The evidence is
your responsibility while it is in your possession. Evidence must be kept safe and tracked.
Every time evidence is moved, it should be reported. This allows all parties involved to
know exactly where the evidence is at all times.
• The second playbook your team might use is called the protecting and preserving
evidence playbook. Protecting and preserving evidence is the process of properly
working with fragile and volatile digital evidence. As a security analyst, understanding
what fragile and volatile digital evidence is, along with why there is a procedure, is
critical. As you follow this playbook, you will consult the order of volatility, which is a
sequence outlining the order of data that must be preserved from first to last. It prioritizes
volatile data, which is data that may be lost if the device in question powers off,
regardless of the reason. While conducting an investigation, improper management of
digital evidence can compromise and alter that evidence. When evidence is improperly
managed during an investigation, it can no longer be used. For this reason, the first
priority in any investigation is to properly preserve the data. You can preserve the data by
making copies and conducting your investigation using those copies.
Another programming language used by analysts is called Structured Query Language (SQL).
SQL is used to create, interact with, and request information from a database. A database is an
organized collection of information or data. There can be millions of data points in a database. A
data point is a specific piece of information.
Operating systems
An operating system is the interface between computer hardware and the user. Linux®,
macOS®, and Windows are operating systems. They each offer different functionality and user
experiences.
Previously, you were introduced to Linux as an open-source operating system. Open source
means that the code is available to the public and allows people to make contributions to improve
the software. Linux is not a programming language; however, it does involve the use of a
command line within the operating system. A command is an instruction telling the computer to
do something. A command-line interface is a text-based user interface that uses commands to
interact with the computer. You will learn more about Linux, including the Linux kernel and GNU,
in a later course.
Web vulnerability
A web vulnerability is a unique flaw in a web application that a threat actor could exploit by
using malicious code or behavior, to allow unauthorized access, data theft, and malware
deployment.
To stay up-to-date on the most critical risks to web applications, review the Open Web
Application Security Project (OWASP) Top 10.
Antivirus software
Antivirus software is a software program used to prevent, detect, and eliminate malware and
viruses. It is also called anti-malware. Depending on the type of antivirus software, it can scan
the memory of a device to find patterns that indicate the presence of malware.
Encryption
Encryption makes data unreadable and difficult to decode for an unauthorized user; its main goal
is to ensure confidentiality of private data. Encryption is the process of converting data from a
readable format to a cryptographically encoded format. Cryptographic encoding means
converting plaintext into secure ciphertext. Plaintext is unencrypted information and secure
ciphertext is the result of encryption.
Note: Encoding and encryption serve different purposes. Encoding uses a public conversion
algorithm to enable systems that use different data representations to share information.
Penetration testing
Penetration testing, also called pen testing, is the act of participating in a simulated attack that
helps identify vulnerabilities in systems, networks, websites, applications, and processes. It is a
thorough risk assessment that can evaluate and identify external and internal threats as well as
weaknesses.