Monday 25 November 2019

Information Security Analyst - who is he? Immersion in the profession

Today we will give you an overview of the daily duties of an information security analyst. His work is, in fact, a constant analysis of raw data from
heterogeneous sources of events (information and network) security to maintain (and preferably) increase the level of security of the organization. These are not always specific practical actions, but, as a rule, they include data aggregation from many possible sources: event logs of operating systems, firewalls, routers, antivirus scanners, and much more. Then he needs to combine
or match them to obtain a data set that can be processed using appropriate algorithms.

Security Analytics in Detail

The difficult part of the IB analytics profession is to find the current active threats in the notorious haystack. And what's more, go beyond the current threat to see and analyze the whole picture. And as a result, block all threats similar to it or come up with a one-time, but effective answer. 

In order to do this correctly, it is important to immediately determine the type of analysis required, as well as highlight the specific events on which you will focus in this investigation.

This is a bird's eye view of information security analytics.


Now let's talk about Security Information and Event Management, or SIEM. This, in essence, is the same as I described above - processing event logs, mainly from the logs of operating systems, network devices and other security tools, and their subsequent combined analysis. At the end of the analysis, classical mathematical statistics are used so that the initial data can be reliably interpreted by people.

Thursday 3 October 2019

The Calling Computer frameworks professional

A computer systems technician carries out the development and production of software and hardware systems, operates and carries out maintenance of computer systems, is engaged in technical support and configuration of both the system as a whole and its individual elements, provides a process for protecting information in software systems of computer systems.

Computer Technician Functions:

installation and configuration of peripheral equipment, the use of microprocessor systems;
design of digital devices;
maintenance and repair of computer systems and complexes;
development of concepts for computer systems based on integrated circuits of varying degrees of integration;
the use of computer-aided design in the process of developing software and hardware;
management of the structural unit, consisting of a staff of technical specialists.