Security monitoring tool system using threat intelligence vs threat hunting
This project is about developing a Security Monitoring Tool System using Graylog SIEM (Security Information Event Management) with a combination of Threat Intelligence and an expected outcome for Threat Hunting results. This is built in accordance to specific ruleset been made for threat hunting...
| Main Author: | Wan Ikbal Ismat Wan Kamal |
|---|---|
| Format: | Monograph |
| Published: |
Open University Malaysia
2021
|
| Subjects: | |
| Online Access: | https://library.oum.edu.my/repository/1435/ |
Similar Items
Security threats of finger print biometric in network system environment
by: Taha, Imad, et al.
Published: (2011)
by: Taha, Imad, et al.
Published: (2011)
Characterizing Current Features of Malicious Threats on Websites
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019)
Tackling the threats of Internet worms
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
Shoulder surfing security threat prevention using shifting directions / Tey Boon Hau
by: Tey, Boon Hau
Published: (2018)
by: Tey, Boon Hau
Published: (2018)
Threat analysis using artificial neural network
by: Yee, Chan Pheng
Published: (2009)
by: Yee, Chan Pheng
Published: (2009)
Framework for Alternate Execution of Workflows Under Threat
by: Safdar, S., et al.
Published: (2010)
by: Safdar, S., et al.
Published: (2010)
Android Botnets: A Serious Threat to Android Devices
by: Shahid, Anwar, et al.
Published: (2018)
by: Shahid, Anwar, et al.
Published: (2018)
Protect data and be alert to online cyber threats
by: Irman, Khalil, et al.
Published: (2021)
by: Irman, Khalil, et al.
Published: (2021)
A Survey on Internet Security Threat in Malaysia’s Internet Banking System and Suggestion Solutions
by: Mohd Hariz, Ibrahim, et al.
Published: (2018)
by: Mohd Hariz, Ibrahim, et al.
Published: (2018)
Learning-based conceptual framework for threat assessment of multiple vehicle collision in autonomous driving
by: Muzahid, Abu Jafar Md, et al.
Published: (2020)
by: Muzahid, Abu Jafar Md, et al.
Published: (2020)
Threats and solutions for ATM security systems
by: Alharaki, Omarah Omar, et al.
Published: (2011)
by: Alharaki, Omarah Omar, et al.
Published: (2011)
An Overview on Existential Threats Posed-by Human-like Super-intelligent Machines to Humanity
by: Jie, Xi
Published: (2021)
by: Jie, Xi
Published: (2021)
Mobile edutainment AR treasure hunt application
by: Chong, Jia Ni
Published: (2021)
by: Chong, Jia Ni
Published: (2021)
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
Securing library information system: Vulnerabilities and threats
by: Mohamad Tahir, Hatim, et al.
Published: (2010)
by: Mohamad Tahir, Hatim, et al.
Published: (2010)
Suicide is a national security threat
by: Ng, Alvin Lai Oon *
Published: (2022)
by: Ng, Alvin Lai Oon *
Published: (2022)
The politics of regional security threat in Nigeria
by: Sule, Babayo, et al.
Published: (2022)
by: Sule, Babayo, et al.
Published: (2022)
School Co-Curricular Management System
by: Muhammad Fyruz Ismat, Azmi
Published: (2022)
by: Muhammad Fyruz Ismat, Azmi
Published: (2022)
Battling the threat of the Internet
by: Manasrah, Ahmed M.
Published: (2010)
by: Manasrah, Ahmed M.
Published: (2010)
Systems integration: A tool for project monitoring in the public sector / Noriati Baharum
by: Noriati , Baharum
Published: (2000)
by: Noriati , Baharum
Published: (2000)
An ICMPv6 threat model / Wan Nor Ashiqin Wan Ali
by: Wan Ali, Wan Nor Ashiqin
Published: (2015)
by: Wan Ali, Wan Nor Ashiqin
Published: (2015)
A comparative analysis study on information security threat models: a propose for threat factor profiling
by: Sidi, Fatimah, et al.
Published: (2017)
by: Sidi, Fatimah, et al.
Published: (2017)
Network security tools-firewall / Ding Khoon Chong
by: Ding, Khoon Chong
Published: (2005)
by: Ding, Khoon Chong
Published: (2005)
INTI International University Campus (INTI-IU) Security Monitoring System With Face Recognition Technology
by: Yap, Choi Sen, et al.
Published: (2020)
by: Yap, Choi Sen, et al.
Published: (2020)
Intelligent Tutoring System for Mandarin-English (ITS-4-ME) / Wan Faizah Wan Zin
by: Wan Faizah, Wan Zin
Published: (2003)
by: Wan Faizah, Wan Zin
Published: (2003)
Security threats to privacy data of Malaysian youth’s: online transaction and communication
by: Shariffah Mamat,, et al.
Published: (2023)
by: Shariffah Mamat,, et al.
Published: (2023)
Development of an intelligent prediction tool for rice yield based on machine learning techniques
by: Md. Sap, Mohd. Noor, et al.
Published: (2006)
by: Md. Sap, Mohd. Noor, et al.
Published: (2006)
Secure framework for implementing close circuit television (CCTV) system as a crime prevention tool : case study (Malaysia)
by: Achin, Hamidi
Published: (2008)
by: Achin, Hamidi
Published: (2008)
Household threat
by: Lee, Kian Seng
Published: (2023)
by: Lee, Kian Seng
Published: (2023)
The development of virtual product life cycle design tool using artificial intelligence technique
by: Harun, Habibollah, et al.
Published: (2008)
by: Harun, Habibollah, et al.
Published: (2008)
PESAT application Personal Security Administrator Tool / Law Yong Jin
by: Law , Yong Jin
Published: (2004)
by: Law , Yong Jin
Published: (2004)
The impact on non-traditional security threats in Sri Lanka
by: Ong, Jessica Hai Liaw, et al.
Published: (2021)
by: Ong, Jessica Hai Liaw, et al.
Published: (2021)
China's oil diplomacy: is it a global security threat?
by: Lai, Hongyi
Published: (2007)
by: Lai, Hongyi
Published: (2007)
Security Threats of Computerised Banking Systems (CBS): the managers' perception in Malaysia
by: Malami, Abu Bakar, et al.
Published: (2012)
by: Malami, Abu Bakar, et al.
Published: (2012)
The effect of IQ vs. EQ on knowledge management and innovation
by: Noordin, Mohamad Fauzan, et al.
Published: (2014)
by: Noordin, Mohamad Fauzan, et al.
Published: (2014)
Household Plant Monitoring System
by: Suugen Raj, Venugopal
Published: (2023)
by: Suugen Raj, Venugopal
Published: (2023)
CST334 - NETWORK MONITORING AND SECURITY APRIL 2008.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CST334 – Network Monitoring & Security January 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
A LANGUAGE TO REPRESENT SECURITY POLICY FOR MULTI-AGENCY HEALTH INFORMATION SYSTEM
by: Intan najua, kamal nasir, et al.
Published: (2008)
by: Intan najua, kamal nasir, et al.
Published: (2008)
Similar Items
-
Security threats of finger print biometric in network system environment
by: Taha, Imad, et al.
Published: (2011) -
Characterizing Current Features of Malicious Threats on Websites
by: Wan Nurulsafawati, Wan Manan, et al.
Published: (2019) -
Tackling the threats of Internet worms
by: Pathan, Al-Sakib Khan
Published: (2012) -
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018) -
Shoulder surfing security threat prevention using shifting directions / Tey Boon Hau
by: Tey, Boon Hau
Published: (2018)