BSIT380 - T302 Week 6 Blog
This week’s chapters, 11 & 12, focused on detecting cyber threats through the analysis of system-collected data. The collection of logs and alerts is not good enough because organizations need to establish network baseline data to identify any abnormal activities. Security Information and Event Management (SIEM) and packet sniffers enable system monitoring, but users must conduct thorough analysis to determine important information.
Chapter 12 shows how threat intelligence enables organizations to anticipate hacker activities. The process of threat identification relies on analyzing unusual files and login patterns to determine the nature of the threat. The approach involves both attack reaction and proactive threat preparation through the analysis of trends and cybercriminals' operational patterns. The main lesson from this week was that data collection becomes effective only when organizations understand how to interpret and defend their systems with the gathered information.
Thanks for stopping by again!
-Derek-
Comments
Post a Comment