- Jul 25, 2017
- 2
Hi there!
I have to make a final master project and I would like to get some information about these things:
1. Use case to implant a SIEM, por instance:
CASO | CATEGORIA | DEFINICIÓN | FUENTE | EPS
Detectar USB infectado | malware | Caso para detectar... | "endpoint" | 44
2. As well I need to know this:
We suppose there is a mounted infraestructure. ¿What requirements taking you would have to know to dimension the solve of a SIEM?
Thank you in advance
I have to make a final master project and I would like to get some information about these things:
1. Use case to implant a SIEM, por instance:
CASO | CATEGORIA | DEFINICIÓN | FUENTE | EPS
Detectar USB infectado | malware | Caso para detectar... | "endpoint" | 44
2. As well I need to know this:
We suppose there is a mounted infraestructure. ¿What requirements taking you would have to know to dimension the solve of a SIEM?
Thank you in advance