Premium Essay

Design and Implement Security Operations Management Best Practices

In:

Submitted By fmbamalu
Words 488
Pages 2
Design and Implement Security Operations Management Best Practices

Lab Assessment Questions

1. During the lab, how did you connect to the Splunk management tool?

I connected to the Splunk management tool by using a web browser and typing in the IP address 127.0.0.1:8000.

2. What are the main functions of Splunk that were demonstrated in the lab and why do they help build more secure operations?

The main function demonstrated by Splunk where the ability to quickly analyze data and show correlations in the data. This builds more secure operations, because data can be compiled and analyzed in minutes instead of hours and days. Thus any necessary action by operations personnel and security personnel can take place in a reasonable amount of time. Splunk also can monitor server events and report alerts as needed to alert personnel to ongoing or current issues.

3. What types of “Data Inputs” are available in Splunk and most other log management tools?
Splunk can receive data inputs from event log collection, remote event log collections, files and directories, local performance monitoring, remote performance monitoring, TCP, UDP, Registry monitoring active directory monitoring, and scripts.

4. What types of “Alert Conditions” are available in Splunk and most other log management tools?

The alert conditions found in Splunk are Info, low, medium, high, and critical.

5. What is the search string for the “Top five sourcetypes” preconfigured Search?

index=_internal (source=*/metrics.log* OR source=*\\metrics.log*) group=per_sourcetype_thruput | chart sum(kb) by series | sort -sum(kb) | head 5

6. Describe at least three examples of security- or operations-related Windows Management Reports and Searches that are preconfigured and available within Splunk.

Splunk has preconfigured reports and searches that monitor

Similar Documents

Premium Essay

Design and Implement Security Operations Management Best Practices

...Overview View the Demo Lab available in the Practice section of the Learning Space Unit 10 and answer the following questions. This lab presents the process of how to design and implement Security Operations Management Best Practices. The Instructor will demo how to gather all the information necessary to implement a Security Operations Management Best Practices solution with the use of Splunk. This lab will thoroughly evaluate the student’s knowledge of the infrastructure worked on and built throughout the course as well as their capability to bring it all together. Lab Assessment Questions & Answers 1. During the Instructor demo lab, how did he connect to the Splunk management tool? a. Using an IP address as the URL (loopback) 2. What are the main functions of Splunk, a log management and alerting tool, that were demonstrated by the Instructor and why do they help build more secure operations? a. Monitors and logs network data and events and alerts users and admin of said events. This allows admins greater awareness of network activity and specifically security. With this tool, admins can more effectively plan their network security strategy. 3. What types of “Data Inputs” are available in Splunk and most other log management tools? a. Scripts, files, directories and network ports 4. What types of “Alert Conditions” are available in Splunk and most other log management tools? a. A Basic Conditional Alert is a trigger that is set off when a certain...

Words: 410 - Pages: 2

Premium Essay

Strategic Change Management

...| Edexcel Level 7EDSMLASSESSMENT ACTIVITY | | Unit Name: | STRATEGIC CHANGE MANAGEMENT | Unit Number: | 03 | Credits: | 10 | Assessor: | Prof. Krishna Mohan .M | Internal Verifier: | | Aim: Strategic change impacts on the human resources structure of the organization and this often means a restructuring of the workforce or changes in working practices. Almost inevitably, change will generate resistance from some, particularly those who feel that the change will have no positive benefits for them. Other people may resist change simply because they prefer status quo. Organizations need to ensure that they have strategies in place to manage resistance to change and this should be part of the overall model that they adopt for managing the change. Once in place, progress towards change will need to be monitored. Strategic change management is most effective when an organization actively seeks the participation of all relevant stakeholders. A change management strategy will be effective only if it has the support of all stakeholders. If they are to have a sense of ownership, stakeholders need to have the opportunity to contribute to the development of the change strategy. Learners will develop an understanding of the models of strategic change and the role that stakeholders play in this process. They will then examine the need for change in a selected organization and plan the implementation of a model for change. Summary of learning outcomes To achieve...

Words: 2836 - Pages: 12

Free Essay

It Managers Book

...The IT Manager’s Guide to ITIL v3 an IT Management eBook contents] [ The IT Manager's Guide to ITIL v3 This content was adapted from Internet.com's bITa Planet, CIO Update, and ITSM Watch Web sites. Contributors: Jennifer Zaino, Mike Tainter, Martin Likier, Drew Robb, Augusto Perazzo, Glen Willis, and Troy DuMoulin 2 5 2 ITIL Version 3 is All Business Drew Robb Bridging the Gap Between IT and Business Augusto Perazzo and Glen Willis 9 5 9 Q&A with Robert Stroud, Member of the ITIL Advisory Group Jennifer Zaino 12 15 The Evolution of Service Management Philosophy Troy DuMoulin Key Differences Between ITIL v2 and v3 Mike Tainter and Martin Likier 12 15 The IT Manager's Guide to ITIL v3, an Internet.com IT Management eBook. © 2008, Jupitermedia Corp. 1 [ The IT Manager's Guide to ITIL v3 ] ITIL Version 3 is All Business By Drew Robb Shrek III” was better. So were "Rocky III" and "Mission Impossible III." But while ITIL III is no blockbuster, it is getting decent ratings from the IT community overall. In particular, it is earning kudos for attempting to bridge the chasm between IT and the various business units within organizations. IT Infrastructure Library (ITIL) made its debut in 1989 and since then has become the de facto standard for IT service management best practices. Since the release of v2 at the start of the millennium, there have been new business regulations and mandates, technology advancements, and general shifts in how IT is valued. In light of...

Words: 8563 - Pages: 35

Premium Essay

Pricinples of Information Security, Chapter 5 Review Questions

...1. How can a security framework assist in the design and implementation of a security infrastructure? Designing a working plan for securing the organization s information assets begins by creating or validating an existing security blueprint for the implementation of needed security controls to protect the information assets.  A framework is the outline from which a more detailed blueprint evolves.  The blueprint is the basis for the design, selection, and implementation of all subsequent security policies, education and training programs, and technologies.  The blueprint provides scaleable, upgradeable, and comprehensive security for the coming years.  The blueprint is used to plan the tasks to be accomplished and the order in which to proceed. What is information security governance? Governance is “the set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately and verifying that the enterprise’s resources are used responsibly.”1 Governance describes the entire process of governing, or controlling, the processes used by a group to accomplish some objective. Just like governments, corporations and other organizations have guiding documents—corporate charters or partnership agreements—as well as appointed or elected leaders or officers, and planning and operating procedures. These elements in combination provide...

Words: 4589 - Pages: 19

Premium Essay

White Paper

...An ISS White Paper Security Strategy Development Building an Information Security Management Program 6303 Barfield Road • Atlanta, GA 30328 Tel: 404.236.2600 • Fax: 404.236.2626 Security Strategy Development Information Security Management A sound information security management program involves more than a few strategically placed firewalls. These safeguards, while important, are only truly effective as part of an overall information security management system. The integration of existing security technologies and processes into a cohesive framework for security management will ultimately reduce inefficiencies and redundancy and ensure the manageability of those solutions. A comprehensive security program should contain the proper balance between people, processes and technology to effectively manage risk with minimal impact on normal business operations. In order to build an appropriate information security program, an organization should assess and define their specific security requirements, design a solution that meets those unique requirements, deploy the necessary policies, technology and procedures, and continuously maintain, adapt and improve that solution. An organization’s overall security strategy will provide a framework for defining those elements necessary in building and maintaining a sound security management program. Strategic planning can take many forms, but the end result should yield a documented approach for achieving goals set within the...

Words: 1442 - Pages: 6

Premium Essay

Abcd

...Documenting the roles and relationships of stakeholders in a process or activity b) Defining requirements for a new service or process c) Analyzing the business impact of an incident d) Creating a balanced scorecard showing the overall status of Service Management 3. What is the main reason for establishing a baseline? a) To standardize operation b) For knowing the cost of services provided c) For roles and responsibility to be clear d) For later comparison 4. Which of the following is NOT an objective of Service Operation? a) Through testing, to ensure that services are designed to meet business needs b) To deliver and support IT services c) To manage the technology used to deliver services d) To monitor the performance of technology and processes 5. Which of the following statements is CORRECT about patterns of demand generated by the customer’s business? a) They are driven by patterns of business activity b) It is impossible to predict how they behave c) It is impossible to influence demand patterns d) They are driven by the delivery schedule generated by capacity management 6. Which of the following is NOT one of the ITIL core publications? a) Service Optimization b) Service Transition c) Service Design d) Service Strategy 7. Which of the following statements is CORRECT? 1. Only one person can be responsible for an activity 2. Only one person can be accountable for an activity a) All of the above b) 1 only c) 2 only d) None of the above ...

Words: 8836 - Pages: 36

Free Essay

Itil Methods

...Index: ITIL® v3 Foundation 2011 Study Notes 1. ITIL v3 Foundation Certification Notes: Service Management as a Practice 2. ITIL v3 Foundation Certification Notes: Service Strategy 3. ITIL v3 Foundation Certification Notes: Service Strategy [2] 4. ITIL v3 Foundation Certification Notes: Service Design 5. ITIL v3 Foundation Certification Notes: Service Design [2] 6. ITIL v3 Foundation Certification Notes: Service Design [3] 7. ITIL v3 Foundation Certification Notes: Service Design [4] 8. ITIL v3 Foundation Certification Notes: Service Transition 9. ITIL v3 Foundation Certification Notes: Service Transition [2] 10. ITIL v3 Foundation Certification Notes: Service Operation and Functions 11. ITIL v3 Foundation Certification Notes: Service Operation [2] 12. ITIL v3 Foundation Certification Notes: Service Operation [3] 13. ITIL v3 Foundation Certification Notes: Continual Service Improvement 14. ITIL v3 Foundation Certification Notes: Last Minutes Revision Notes ITIL v3 Foundation Certification Notes: Service Management as a Practice Why IT Service Management is needed? * Higher IT service quality is always required while fewer resources are available * Users are not interested in the processes / technology, rather they just need to utilize the service to achieve business goals * As users are usually not directly responsible for the costs of IT services, they would endlessly request more and more IT services with higher and higher standards /...

Words: 20852 - Pages: 84

Premium Essay

Computers

...Cloud computing security is the set of control-based technologies and policies designed to adhere to regulatory compliance rules and protect information, data applications and infrastructure associated with cloud computing use.  http://searchcompliance.techtarget.com/definition/cloud-computing-security https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf Threats from cloud computing IaaS providers offer their customers the illusion of unlimited compute, network, and storage capacity — often coupled with a ‘frictionless’ registration process where anyone with a valid credit card can register and immediately begin using cloud services. Some providers even offer free limited trial periods. By abusing the relative anonymity behind these registration and usage models, spammers, malicious code authors, and other criminals have been able to conduct their activities with relative impunity. PaaS providers have traditionally suffered most from this kind of attacks; however, recent evidence shows that hackers have begun to target IaaS vendors as well. Future areas of concern include password and key cracking, DDOS, launching dynamic attack points, hosting malicious data, botnet command and control, building rainbow tables, and CAPTCHA solving farms. Threat #3: Malicious Insiders Description The threat of a malicious insider is well-known to most organizations. This threat is amplified for consumers of cloud services by the convergence of IT...

Words: 1105 - Pages: 5

Free Essay

Itil

...Published in association with the Best Management Practice Partnership The IT Service Management Forum An Introductory Overview of ITIL® V3 A high-level overview of the IT INFRASTRUCTURE LIBRARY The IT Infrastructure Library An Introductory Overview of ITIL® V3 Version 1.0 Written by: Alison Cartlidge Ashley Hanna Colin Rudd Ivor Macfarlane John Windebank Stuart Rance Alison Cartlidge Mark Lillycrop Xansa - Steria HP itEMS Ltd IBM Sun HP Xansa - Steria itSMF UK Edited by: Published by: The UK Chapter of the itSMF With thanks to all those who took part in the review process. © Copyright itSMF Ltd, 2007 This version first published 2007 Based on other copyright material with the permission of the copyright owners. ITIL® is a Registered Trade Mark, and a Registered Community Trade Mark, of the Office of Government Commerce (OGC) and is registered in the US Patent and Trade Mark Office. PRINCE® is a Registered Trade Mark, and a Registered Community Trade Mark, of the Office of Government Commerce (OGC) and is registered in the US Patent and Trade Mark Office. COBIT® is a Registered Trade Mark of ISACA and the ITGA. CMM® is registered in the USA Patent and Trademark Office. PMBoK® is a Registered Trade Mark of the Project Management Institute. M_o_R ® is a Registered Trade Mark and a Registered Community Trade Mark of the Office of Government Commerce. © Crown copyright material reproduced with the kind permission of OGC on behalf of the Controller of...

Words: 12782 - Pages: 52

Premium Essay

Management Information System Chapter 1

... 2) Which of the following choices may lead to competitive advantage (1) new products, services, and business models; (2) charging less for superior products; (3) responding to customers in real-time? A) 2 and 3 B) 1, 2, and 3 C) 1 only D) 1 and 2 Ans: B) 1,2, and 3 3) A major criterion in deciding the most important perspectives of a business problem is: A) change management. B) usefulness. C) organizational needs. D) implementation. Ans:B) Usefulness 4) Inadequate database capacity is an example of the ________ dimension of business problems. A) people B) management C) organizational D) technology Ans:D) Technology 5) The owners of Speed-EZ, a new bike messenger service, are concerned about how they will manage their messengers once they have left the office. This is a business problem that falls into the: A) management dimension. B) technology dimension. C) people dimension. D) organizational dimension. Ans:C) People Dimension 6) Aging hardware and outdated software are examples of the ________ dimension of business problems. A) management B) technology C) organizational D) information systems. Ans:B) Technology 7) One of the most frequent errors in problem solving is: A) following a rote pattern of decision making. B)...

Words: 2622 - Pages: 11

Premium Essay

It Security

...NextGard Technologies Windows Security Implementation Model Michael White American Public University Author Note This paper was prepared for ISSC362 B003 Fall 12, taught by Professor Butler, William NextGard Technologies Windows Security Implementation Model Below are the seven areas of concentration for the focus of this essay: in section one Microsoft Windows access controls will be researched and discussed for solutions with details that are appropriate, in section two cryptography methods will be researched and detailed in order to protect the organization, in section three a plan will be devised to protect the company against malicious code and activity, in section four a plan will be implemented to monitor and analyze the network, in section five detailed security guidelines will be discussed, section six will discuss best practices for the security, and the appendix will include the network topology of the sites and the network infrastructure. The goal of this essay is to implement a model that encompasses a complete security model. Below each section discusses the above mentioned topics with a brief summary to close the essay. The matter of security of a network and access permissions is simple when certain protocols are followed. In the scenario for this assignment the company Ken 7 Windows Limited needs protocols for access control measures to protect restricted data. The first step is to ensure the process for setting up controls is understood...

Words: 1425 - Pages: 6

Premium Essay

Software Security

...describes the need for and the challenges of building secure software, general principles of secure software development, and the key elements of a secure software life cycle process. Key Highlights of Term Paper * Software’s Vulnerability to Attack  * The Challenge of Building Secure Software  * Software Assurance  * General Principles of Secure Software Development  * What the Software Practitioner Needs to Know  * Integrating Security into the Software Life Cycle ------------------------------------------------- Software’s Vulnerability to Attack What makes it so easy for attackers to target software is the virtually guaranteed presence of vulnerabilities, which can be exploited to violate one or more of the software’s security properties. According to CERT, most successful attacks result from targeting and exploiting known, non-patched software vulnerabilities and insecure software configurations, many of which are introduced during design and code. In their Report to the President titled Cyber Security: A Crisis of Prioritization, the President’s Information Technology Advisory Committee summed up the problem of non-secure software as follows: Software development is not yet a science or a rigorous discipline, and the development process by and large is not controlled to minimize the vulnerabilities that attackers exploit. Today, as with cancer, vulnerable software can be invaded and modified to cause damage to previously healthy software, and infected...

Words: 2959 - Pages: 12

Premium Essay

Security Awareness

...Information Security - Security Awareness Abstract: 3 Security Awareness 4 Regulatory Requirements for Awareness and Training 7 References 13 Abstract: Information security means protecting information and information systems (IS) from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. A policy can be described as a set of principles intended to manage actions. An Information Security Policy (ISP) is a defined set of principles intended to protect information and information systems by controlling the actions allowed within an organization. There is not a single off the shelf approach to implement an ISP. The ISP is tailored to the specific organization and defined by the environment of the IS, the classification of the information, governance and compliance laws, and the levels of acceptable risk to the organization. An IPS has many areas to cover but the most prominent subject matter is risk management. Risk management addresses an organization's assets exposure to environmental risks. Since risk management is continuous and must be reevaluated whenever changes are introduced into the environment or when a breach of the policy has occurred so should the ISP. Policies must be useable, workable and realistic. In order to truly measure the effectiveness of an ISP measurements or metrics must be defined in order to grade or rate the effectives. ISPs that are not applicable, reviewed...

Words: 2691 - Pages: 11

Premium Essay

Itil Foundation

...ITIL® is a Registered Trade Mark of the Cabinet Office. Welcome! IT Service Management ITIL 2011 Foundation 1 Course Objectives • • A basic understanding of the ITIL Framework How ITIL can be used to enhance the quality of IT Service Management within an organization • Comprehension and/or awareness of key areas of the 5 ITIL core books: Service Strategy, Service Design, Service Transition, Service Operation, Continual Service Improvement • To prepare to take the ITIL Foundation exam 2 I0015EN v3.1 ©2011 QRP International 1 ITIL® is a Registered Trade Mark of the Cabinet Office. ITIL Foundation Training Programme • • • Generalities Service Management key concepts Service Strategy o Service Portfolio Management o Business Relationship Management o Financial Management Service Design o Service Level Management o Service Catalogue Management o Supplier Management o Information Security Management o Availability Management o Capacity Management o IT Service Continuity Management o Design Coordination Service Transition o Service Asset and Configuration Management o Knowledge Management o Transition Planning o Release and Deployment Management o Change Management Service Operation o Functions o Incident Management o Event Management o Request Fulfilment o Access Management o Problem Management Continual Service Improvement o 7 step improvement process o The Deming Cycle o CSI approach • D • A Y 1 D A Y 2 • D • A Y 2 D Examination Training...

Words: 16101 - Pages: 65

Premium Essay

Case Study

...CASE 2: Developing an Organizational Structure Prepared By: GROUP 10 (Management 1) Course: Business Administration Major in Marketing Management Executive Summary The case study being conducted is primarily to give emphasis on decentralized form of authority among departments of an organization. It discuss about effective use of an organization. It discuss about effective use of an organizational chart to see true segregated authority of members of an organizational distinguishing difference authority given to each member of the organization is within the premise of organizational chart. A question has been drawn, “How is Departmentalization differ from Organizational Structure?” It simply defined the two parties. Departmentalization is the process of grouping similar activities into the same department. It can be based on functions of the company, product, customer, process and geographical departmentalization. Organizational Structure, on the other hand, refers to the division of total activities of an organization into related groups to be performed by the prescribed authority. It shows the hierarchy of activities in an organization according to work and the reporting relationships. To support the whole case study, a literary review had been conducted. Three related cases in the main case had stated. Cisco’s implementing of organizational structure was pinpointed as a good guide in understanding the main case. Its lifestyle methodology had been...

Words: 3225 - Pages: 13