Högskolan i Skövde

his.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • apa-cv
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Hur man Implementerar Säkerhetsinformation och Event Managering med en Generell Loggstrategi
University of Skövde, School of Informatics.
2022 (Swedish)Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesisAlternative title
How to Implement Security Information and Event Management with a General Log Strategy (English)
Abstract [en]

As internet activity and the use of technology increase so does the landscape for vulnerabilities that can be abused by cyber-criminals. In today's world, it is not the question if a cyber attack will happen but rather when will it happen. Therefore, to protect ourselves from attacks we have to find the vulnerabilities before they can be exploited. This is where security information and event management together with log strategies come into play as they focus more on the detection and response of threats rather than only trying to prevent them. However, organizations should still define their log strategy and log management solution as a means to gain better insight into any vulnerabilities that may exist within their infrastructure. Logs are produced by a big variety of devices with different content and formats. This makes the creation of a logging strategy a difficult and enduring task and if companies decide they want to implement such a solution they will need to invest both a lot of time and money.This study has created a general guide for companies that may lack knowledge or sufficient funds. The guide will help organizations to implement a basic foundation for their log management and find what their vulnerabilities or shortcomings may be. A general design is presented, implemented and evaluated in a case study. This work demonstrates the applicability of the guideline. The results are that even though it is difficult to implement log management it is also possible to create a basic log management foundation for an organization. This study concludes how a company can achieve a basic foundation and achieve security information and event management for their organization by the use of a general log strategy.

Place, publisher, year, edition, pages
2022. , p. 38
National Category
Information Systems
Identifiers
URN: urn:nbn:se:his:diva-21963OAI: oai:DiVA.org:his-21963DiVA, id: diva2:1704045
External cooperation
Stratsys
Subject / course
Informationsteknologi
Educational program
Network and Systems Administration
Supervisors
Examiners
Available from: 2022-10-17 Created: 2022-10-17 Last updated: 2022-10-17Bibliographically approved

Open Access in DiVA

fulltext(723 kB)112 downloads
File information
File name FULLTEXT01.pdfFile size 723 kBChecksum SHA-512
e34d6e412cb35ccfa4a2270ab9adb789f72a8e175064acdd8bef196601aa7d1b40868ed2e4c87af7bae661bc3ef773b9c051cdd50244336304c66cbf3d4d9f21
Type fulltextMimetype application/pdf

By organisation
School of Informatics
Information Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 112 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 143 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • apa-cv
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf