Sketch the components of a SIEM and describe each component. Describe some engin
ID: 3838436 • Letter: S
Question
Sketch the components of a SIEM and describe each component.
Describe some engineering challenges that face the development of each component. Specifically, list several challenges for each component. Also, rank the challenges in two ways. First rank the importance of challenge and then, rank them in terms of difficulty of meeting the challenge. Finally, by combining these two rankings, pick a single challenge that is most worth engineering effort. Be sure to give justification of your rankings. Also, be prepared to defend your selection in class.
Explanation / Answer
security information and event management is used to give real time threat level analysis they have serveral components,log management alerting,Forensic analysis,Security Evaluation and Decision Support trustworthy event collection.are few of the serveral components available.
log management: they contain history of specific events and notifications the are used for commit and rollback operations
alerting is the way of send a way which a event have been oocured and we need to check out the notification that is good or bad
Security Evaluation and Decision Support there are more methods that are available for the securing software but they all must be reliable and safe in any environment condition.
forensic analysis gives analysis of fraud activities of people and data analysis of the system one can easily understand the way of attacker activities
trustworthy event collection
In a software system resources will be collected from different locations and different places so the information we gather should be trust worthy whether this can be accepted in the system.
ranking of challenges
Security Evaluation and Decision Support every time the system cant be secured the system will have weak spots
trustworthy event collection information gathered could be leaked and duplicate events could be occured
Forensic analysis fake information is hard to find and detect
log management log can not maintain large volume of data that too will have duplication of data updation of log should be carefully done.
rank in terms of difficulty of meeting the challenge
Forensic analysis
Security Evaluation and Decision Support
trustworthy event collection
log management
alerting
Security Evaluation and Decision Support will be major issue here because of rapid growth of the technology.new and improved software system are built everyday
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.