Abstract

Cybersecurity monitoring today is laborious but straightforward: dump network traces at chokepoints in a network, collect log files from services, feed both to a proper security information and event management solution, and get alerted if something suspicious happens, right? Wrong!

Highlights

  • P revention fails, no matter how meticulously security measures are designed, deployed, and operated

  • Continuous monitoring at all layers, in all protocols, and on all systems related to critical company assets is a vital prerequisite to effective detection and response— we can’t fight what we can’t see

  • These comprehensive monitoring capabilities are widely underdeveloped in most organizations, those not native to the security domain

Read more

Summary

Introduction

P revention fails, no matter how meticulously security measures are designed, deployed, and operated. Following these principles enables us to come up with an infrastructure design spanning the network layer and hosts up to third-party services, which allows effective monitoring and logging using state-of-the-art technologies.

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call