SIEM ve Log Yönetimi Çözümlerinde Geçmiş Zaman Sorgulama İle İlgili Anlatılmayanlar veya Gözden Kaçanlar

  1. KVKK
  2. IBM veri ihlali raporu
  3. Solarwinds Case
  • Bu saldırı ne zaman başladı?
  • Hangi kaynaklar etkilendi?
  • Saldırganlar kimler?
  • Bu saldırganlar başka hangi iç kaynaklara erişti?
  1. https://www.ibm.com/tr-tr/security/data-breach
  2. https://lucidworks.com/post/estimating-memory-and-storage-for-lucenesolr/
  3. https://drertugrulakbas.medium.com/elasticsearch-ve-elasticsearch-kullanan-b%C3%BCt%C3%BCn-siem-ve-log-y%C3%B6netimi-%C3%A7%C3%B6z%C3%BCmleri-neden-disk-canavar%C4%B1-24424624d4e5
  4. https://www.exabeam.com/siem-guide/siem-architecture/
  5. https://docs.fortinet.com/document/fortisiem/6.3.1/elasticsearch-storage-guide/887430/setting-up-elasticsearch-for-fortisiem-event-storage

--

--

--

Entrepreneur,Security Analyst,Research.

Love podcasts or audiobooks? Learn on the go with our new app.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Ertugrul Akbas

Ertugrul Akbas

Entrepreneur,Security Analyst,Research.

More from Medium

Solarwinds: The Greatest US Cyberattack in History

Wireless Pioneer Betacom Secures $15M in Funding, Launches Industry’s First Managed Private 5G…

Connect a Particle Xenon to the Cloud via CLI

The Ukraine Russia situation has the potential to be “Déjà vu all over again”