top of page

How Would You Monitor and Log Cyber Security Events

Monitoring and Logging Security Events is crucial for understanding and responding to potential security threats.

In order to Monitor and Log security events, follow these steps:

  1. Install security tools like firewalls, antivirus programs, and intrusion detection systems (IDS). These tools are like security cameras and alarms for your computer network. They watch for suspicious activity and alert you when something odd happens. For example Snort, Suricata.

  2. Set Up a Security Information and Event Management (SIEM) System. ELK, Wazuh are some examples of Open Source SIEM tools.

  3. Create and Set Up Alerts in order to create/send alerts for suspicious activities. For instance, if your system suddenly sees a lot of login attempts in a short time, it could be a sign of a brute force attack, and an alert would be sent out.

  4. Regularly Monitor SIEM Tool for any alerts. Also monitor network and system activities. This is like having a security guard who constantly monitors surveillance footage, looking for anything out of the ordinary.

0 views

Recent Posts

See All
bottom of page