Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

GROUP

ASSIGNMENT
EVALUATION FORM

DIPLOMA IN LAW ENFORCEMENT


MANAGEMENTCOMPUTER SECURITY &
THREATS LIABILITIES (DLE 2013)

GIC
STUDENT’S NAME:

NAME IC SEMESTER
EDMOND EMANG 030925-13-1799 4
LAING
NURUL MAISARAH 001016-03-0728 4
BINTI NOR HARIFI
AIN NUR SAFIRAH 4
MUHAMMAD RAZIMAN 040826-03-0705 4
BIN MUHAMAD NOR
JANSI D/O BATUMALAI 990507065600 4

LECTURER’S NAME:

NAME
Ms. Darshini Ganesan

1
TABLE OF CONTENTS

2
INTRODUCTION

Infrastructure security refers to a fundamental approach aimed at safeguarding an


organization’s entire technological framework. It encapsulates strategies and
measures that ensure the integrity, resilience, and reliability of all the systems and
networks forming the backbone of an enterprise’s operations.There are two main
goals of infrastructure security.

First, it seeks to enhance security protocols and the overall security posture of an
organization. Second, it strives to reduce potential downtimes and the subsequent
risks, such as customer attrition, reputational damage, and escalating compliance-
related expenses.

THREE CONCEPTS OF SECURITY

1.Security information and event management, or SIEM, is a security solution that


helps organizations recognize and address potential security threats and
vulnerabilities before they have a chance to disrupt business operations. SIEM
systems help enterprise security teams detect user behavior anomalies and use
artificial intelligence (AI) to automate many of the manual processes associated with
threat detection and incident response.

2.The original SIEM platforms were log management tools, combining security
information management (SIM) and security event management (SEM) to enable
real-time monitoring and analysis of security-related events, as well as tracking and
logging of security data for compliance or auditing purposes.(Gartner coined the term
SIEM for the combination of SIM and SEM technologies in 2005.)

3.Over the years, SIEM software has evolved to incorporate user and entity behavior
analytics (UEBA), as well as other advanced security analytics, AI and machine
learning capabilities for identifying anomalous behaviors and indicators of advanced
threats. Today SIEM has become a staple in modern-day security operation centers
(SOCs) for security monitoring and compliance management use cases.

3
4
5
6
7

You might also like