Posts

Security Operation Center (SOC)

Image
I have previously written on SIEM before, which is a main part of a SOC. Todays’ post dive in to details of a SOC which makes use of a SIEM system. To get clarified the relationship between the two, let’s get in to the business without any further ado. What is a SOC? Image Source: https://cybrhawk.com/security-operations-center/ SOC stands for Security Operation Center, which is a centralized unit that deals with security on an organizational level. This centralized unit includes people, processes and technologies in continually monitoring organizations’ security posture. SOC has its objectives as preventing, analyzing, and responding to cybersecurity incidents. SOC brings the organizations’ IT security monitoring and incident response activities in to a single location and hold the responsibility of handling internal breaches and cyber-attacks. The Importance of Having a SOC Organizations, regardless of their size is always subjected to cyberattacks, malware infection...

SIEM

Image
  SIEM stands for Security Information and Event Management which refers to a set of tools and services that aids security professionals with getting a helicopter view of an organizations’ information security. SIEM facilitates two aspects of security: Collection of data from multiple log files, analysis and report supplication on security threats and events – Security Information Management (SIM) Real time system monitoring, threat monitoring, event correlation and incident response – Security Event Management (SEM) SIEM tools which play an important role in an organizations’ information security eco system, collects security data from organizations’ security infrastructure, host systems, applications, network and security devices such as firewalls and antivirus filters.   SIEM Work Break Down The processes carried out by the SIEM software can be observed in following steps: Collection of data from various sources Security data from sources of network security infor...

Bug Bounty Hunters

Image
  Where have you heard the word bounty or may be bounty hunter? I’m positive that is from a Television show, well for me, that was the case. Heard it in Lucifer! Anyhow in professional grounds, bounty hunters also called bail enforcement officers, in general terms is known to be a professional person who captures fugitives or criminals for a commission or bounty. These types of personals work for law enforcement to lure fugitives out from hiding and bring them to justice. But this post is not about those bounty hunters but about a different kind of bounty hunters in cyber security sphere, bug bounty hunters. Ethical Hacking and Bug Bounty Hunting A bug bounty hunter is an individual who discovers and reports software bugs. But wait! There is a well-known term we use for that, if you would say, and if that’s Ethical Hacking you have in mind, I would say those are two different things. Ethical hacking is mainly penetrating testing (Pen tests) carried out by a company specialize...

IoT, 5 G and Edge Computing

Image
Fantasies in to Realities As kids, many of us might have fantasized future in 20, 30 years after with smart houses and self-driving vehicles becoming ubiquitous. As adults, we now know that these fantasies are not fantasies any more, just the technologies like Internet of Things (IoT) and 5G have replaced the magic behind those we saw as kids. Not only that, even the manufacturing industries are moving towards automation under emerging concepts such as Industry 4.0. The need of capturing real time changes and uncertainties of manufacturing systems is facilitated by IoT. IoT is a dynamic network infrastructure to measure, identity, position, track and monitor physical objects in order to facilitate interactions between human and human, human and thing, and thing and thing. IoT data acquisition means, including embedded sensors, RFIDs, and near field communications, collect and share process related data instantly about the state of a manufacturing system from the different decision- m...

CYBER SECURITY IN PANDEMIC TIMES

Image
  With the rise of the pandemic Covid-19 from the early months of 2020, the whole world is adopting a new norm of working online, let that be business community or academic community. The world is compelled to carry out the day to day lives online, making information the most valuable and precious asset than any other time in the history. The work from home approach, the companies adopted has led for many cyber-attacks. This turn of events has brought more weight to the security of information stored and transmitted in cyber space. Thus, comes the topic of cyber security under the lime light, shining brighter than ever before. What is Cyber Security? According to Cisco, Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. It would definitely sound unbelievable if one ...