Professional Documents
Culture Documents
Group Assignment Evaluation Form: Diploma in Law Enforcement Managementcomputer Security & Threats Liabilities (Dle 2013)
Group Assignment Evaluation Form: Diploma in Law Enforcement Managementcomputer Security & Threats Liabilities (Dle 2013)
ASSIGNMENT
EVALUATION FORM
GIC
STUDENT’S NAME:
NAME IC SEMESTER
EDMOND EMANG 030925-13-1799 4
LAING
NURUL MAISARAH 001016-03-0728 4
BINTI NOR HARIFI
AIN NUR SAFIRAH 4
MUHAMMAD RAZIMAN 040826-03-0705 4
BIN MUHAMAD NOR
JANSI D/O BATUMALAI 990507065600 4
LECTURER’S NAME:
NAME
Ms. Darshini Ganesan
1
TABLE OF CONTENTS
2
INTRODUCTION
First, it seeks to enhance security protocols and the overall security posture of an
organization. Second, it strives to reduce potential downtimes and the subsequent
risks, such as customer attrition, reputational damage, and escalating compliance-
related expenses.
2.The original SIEM platforms were log management tools, combining security
information management (SIM) and security event management (SEM) to enable
real-time monitoring and analysis of security-related events, as well as tracking and
logging of security data for compliance or auditing purposes.(Gartner coined the term
SIEM for the combination of SIM and SEM technologies in 2005.)
3.Over the years, SIEM software has evolved to incorporate user and entity behavior
analytics (UEBA), as well as other advanced security analytics, AI and machine
learning capabilities for identifying anomalous behaviors and indicators of advanced
threats. Today SIEM has become a staple in modern-day security operation centers
(SOCs) for security monitoring and compliance management use cases.
3
4
5
6
7