Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Sketch the components of a SIEM and describe each component. Describe some engin

ID: 3838436 • Letter: S

Question

Sketch the components of a SIEM and describe each component.

Describe some engineering challenges that face the development of each component. Specifically, list several challenges for each component. Also, rank the challenges in two ways. First rank the importance of challenge and then, rank them in terms of difficulty of meeting the challenge. Finally, by combining these two rankings, pick a single challenge that is most worth engineering effort. Be sure to give justification of your rankings. Also, be prepared to defend your selection in class.

Explanation / Answer

security information and event management is used to give real time threat level analysis they have serveral components,log management alerting,Forensic analysis,Security Evaluation and Decision Support  trustworthy event collection.are few of the serveral components available.

log management: they contain history of specific events and notifications the are used for commit and rollback operations

alerting is the way of send a way which a event have been oocured and we need to check out the notification that is good or bad

Security Evaluation and Decision Support there are more methods that are available for the securing software but they all must be reliable and safe in any environment condition.

forensic analysis gives analysis of fraud activities of people and data analysis of the system one can easily understand the way of attacker activities

trustworthy event collection

In a software system resources will be collected from different locations and different places so the information we gather should be trust worthy whether this can be accepted in the system.

ranking of challenges

Security Evaluation and Decision Support every time the system cant be secured the system will have weak spots

trustworthy event collection information gathered could be leaked and duplicate events could be occured

Forensic analysis fake information is hard to find and detect

log management log can not maintain large volume of data that too will have duplication of data updation of log should be carefully done.

rank in terms of difficulty of meeting the challenge

Forensic analysis

Security Evaluation and Decision Support

trustworthy event collection

log management

alerting

Security Evaluation and Decision Support will be major issue here because of rapid growth of the technology.new and improved software system are built everyday

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote