A Short brief about Advanced Persistence Threat

Advanced Persistence Threat, these groups are not an individual identity. They are mostly organizations or countries (based on agenda/political reasons) with expertise teams. Not a normal expert, they are trained professionals and they have the potential to break in any systems and move laterally in...

Types of SOC

 Categorize SOCs that are internal to the constituency into five organizational models of how the team is comprised,1. Security team.No standing incident detection or response capability exists. In the event of a computer security incident, resources are gathered (usually from within the constituency)...

A short brief about Security Operations Center

 What Is a Security Operations Center (SOC) ?A SOC is a team primarily composed of security analysts organized to detect, analyze, respond to, report on, and prevent cybersecurity incidents.The practice of defense against unauthorized activity within computer networks, including monitoring,...

Top 10 Use Cases for SIEM

 With the growing use of SIEM solutions, business houses are keen on solving a number security and business use cases seen during their day-to-day operations. In this post, we will go through the top 10 use cases with an overview of how you can use  to detect any such behavior in your infrastructureThe...

Critical Controls and SIEM

 Critical Control 1: Inventory of Authorized and Unauthorized DevicesSIEM can correlate user activity with user rights and roles to detect violations of leastprivilege enforcement, which is required by this control.Critical Control 2: Inventory of Authorized and Unauthorized SoftwareSIEM should...

How Exactly Would the SIEM raise an alert ?

 Well, now you know that the logs from different devices are being forwarded into the SIEM. Take an example: A port scan is initiated against a specific machine. In such a case, the machine would generate a lot of unusual logs.Analyzing the logs, it will be clear that a number of connection failures...

How does SIEM Works?

 One-stop answer is a co-relation. You may have noticed the word “Co-Relation” Yes, for the question How the SIEM works, But not that alone of course.Basically, a SIEM tool collects logs from devices present in the Organization’s infrastructure. Some solutions also collect NetFlow...

Security Information and Event Management (SIEM)

 SIEM software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by network hardware and applications.Vendors sell SIEM as software, as appliances or as managed...

Comparison of Infrared, Radio waves, Microwaves

 InfraredRadio WavesMicrowaves1Infrared is used for short-range communication like TV remotes, mobile phones, personal computers, etc. In science, the Infrared is part of a spectrum that is not visible to the human eyeRadio waves are the  type of wireless communication that can travel large...

Types of Wireless Communication Media

 We are living in a world, where we can connect with friends within seconds no matter how far they are. But this was not possible in earlier days. We all have heard and read that earlier communication is very tough as sending a letter will require many days and sometimes months. Today is not a...

Types of Cables used in Wired Communication Media

Twisted pair cableAs the name suggests these are two twisted pairs of cables or wires made up of insulated copper. These are twisted together in such a way that they run parallelly one wire is used for the transmission of data and the other...