My Account Log in

3 options

Ultimate Splunk for Cybersecurity : Practical Strategies for SIEM Using Splunk's Enterprise Security (ES) for Threat Detection, Forensic Investigation, and Cloud Security (English Edition) / Jit Sinha.

EBSCOhost Academic eBook Collection (North America) Available online

View online

EBSCOhost eBook Community College Collection Available online

View online

Ebook Central College Complete Available online

View online
Format:
Book
Author/Creator:
Sinha, Jit, author.
Language:
English
Subjects (All):
Computer networks--Security measures.
Computer networks.
Computer security.
Computer viruses.
Cryptography.
Physical Description:
1 online resource (273 pages)
Edition:
First edition.
Place of Publication:
Delhi : Orange Education Pvt Ltd, [2024]
Summary:
The Ultimate Splunk for Cybersecurity is your practical companion to utilizing Splunk for threat detection and security operations. This in-depth guide begins with an introduction to Splunk and its role in cybersecurity, followed by a detailed discussion on configuring inputs and data sources, understanding Splunk architecture, and using Splunk Enterprise Security (ES).It further explores topics such as data ingestion and normalization, understanding SIEM, and threat detection and response. It then delves into advanced analytics for threat detection, integration with other security tools, and automation and orchestration with Splunk. Additionally, it covers cloud security with Splunk, DevOps, and security operations. Moreover, the book provides practical guidance on best practices for Splunk in cybersecurity, compliance, and regulatory requirements. It concludes with a summary of the key concepts covered throughout the book.
Contents:
Intro
Cover Page
Title Page
Copyright Page
Dedication Page
About the Author
About the Technical Reviewer
Acknowledgements
Preface
Errata
Table of Contents
1. Introduction to Splunk and Cybersecurity
Introduction
Structure
Overview of Splunk
Defining Splunk
Splunk Ecosystem
Search and Analytics
Search Capabilities
Visualizations
Real-time Alerting
Advanced Features
Introducing Cybersecurity
Importance of cybersecurity in today's digital world
Types of cyber threats
Common cybersecurity frameworks and methodologies
Role of Splunk in Cybersecurity
Log management and event correlation with Splunk
Accelerating incident response and investigation
Use Cases for Splunk in Cybersecurity
Conclusion
Points to Remember
References
2. Overview of Splunk Architecture
Overview of Splunk Architecture
Understanding the Key Components of Splunk
Search Processing Language (SPL)
Advanced SPL commands and examples
More Advanced SPL Commands and Examples
Indexing Data and Strategies
Data Parsing and Event Processing
Data Storage and Indexes
Components of an Index
Configuring Indexing in Splunk
Index Management and Performance Considerations
Indexing Strategy
Scalability and High Availability
Splunk Deployment Options
Best Practices for Splunk Deployment
Search Optimization Techniques
Security Best Practices in Splunk Deployment
Splunk Health Check and Maintenance
3. Configuring Inputs and Data Sources
Introduction to configuring inputs and data sources
Types of data sources
Configuring data inputs
Configuring data inputs for log files
Configuring data inputs for network events.
Configuring data inputs for APIs
A Few other types of data configuration
Understanding and managing data inputs
Data onboarding
Custom log file onboarding example
Identification of data sources and input configuration
Parsing and transforming data
Normalizing data
Validating and testing the onboarding process
Field extractions
4. Data Ingestion and Normalization
Overview of data ingestion in Splunk
Data Ingestion Process in Splunk
Data Parsing and Processing
Data Normalization
Defining Data Normalization in the Cybersecurity Context
A Real-Life Cybersecurity Example
How Splunk Can Help to Normalize Data
Data Models and CIM
Data Models
Common Information Model
Example Scenario
Best practices for Data Ingestion and Normalization
5. Understanding SIEM
Introducing SIEM
SIEM Features and Functions
Common Use Cases and Benefits of SIEM
Integrating Splunk with SIEM
6. Splunk Enterprise Security
Introduction to Splunk Enterprise Security
Splunk ES and its Role in Cybersecurity
How ES Works
Core Components of Splunk ES
Scenario 1: Protecting Against Data Breach Attempts
Scenario 2: Combating Advanced Persistent Threats (APTs)
Scenario 3: Preventing Payment Fraud
Scenario: Implementing Adaptive Response Framework (ARF) for Automated Threat Mitigation
Key Benefits of Using Splunk ES in Cybersecurity
Introduction to Correlation Searches and Notable Events
Creating a new Correlation Search
Example: Detecting Data Exfiltration
Customizing existing correlation searches
Scheduling and Configuring Alert Actions
Scheduling Correlation Searches.
Configuring Alert Actions
Using Splunk ES to Create Notable Events for Insider Threat Detection
Security Monitoring and Incident Investigation
Executive Summary Dashboard
Introduction to Security Posture Dashboard and Incident Review Dashboard
Navigating and Customizing the Security Posture Dashboard
Accessing the Security Posture Dashboard
Understanding dashboard components
Hands-On Scenario 1: Addressing Access Control Challenges
Hands-On Scenario 2: Investigating Network Security Anomalies
Customizing the Security Posture Dashboard
Investigating Notable Events with the Incident Review Dashboard
Navigating to the Incident Review Dashboard
Understanding Dashboard Components
Hands-On Scenario: Managing a Ransomware Attack with the Incident Review Dashboard in Splunk ES
Customizing the Incident Review Dashboard
Filtering and sorting notable events
Incident Ownership and Workflow Management
Investigating Notable Events
Adaptive Response Actions with Splunk ES
Integrating MITRE ATT&amp
CK and Kill Chain Methodology
Managing Advanced Persistent Threats (APTs)
Suppressing Notable Events
Anomaly Detection and Correlation Searches in Splunk ES
Introduction to anomaly detection and correlation searches
The role of anomaly detection in cybersecurity
Overview of correlation searches in Splunk ES
Importance of Anomaly Detection in Cybersecurity
Benefits of anomaly detection
Challenges of anomaly detection in cybersecurity
Integrating Anomaly Detection with Other Security Measures
Combining correlation searches with adaptive response actions
Utilizing machine learning and artificial intelligence techniques
Collaborating and sharing information across teams and tools.
Continuously monitoring and improving detection capabilities
Investigations in Splunk ES
Purpose of Investigations
Starting an Investigation in Splunk ES
Initiating an investigation
Adding Artifacts
Adding Notes, Files, and Links
Collaborating on an Investigation in Splunk ES
Assigning and sharing investigations
Communicating and tracking progress
Closing and Archiving Investigations in Splunk ES
Closing an investigation
Archiving investigations
Reporting and Sharing Findings from Completed Investigations
Reviewing the investigation summary
Sharing the investigation summary
Printing the investigation summary
Best Practices for Investigations in Splunk ES
Evaluating SOC Metrics in the Context of Splunk Enterprise Security
Future Trends
Evolving role of Splunk ES in the cybersecurity landscape
Emerging trends and technologies in cybersecurity and their impact on Splunk ES
7. Security Intelligence
Introduction to Security Intelligence
Definition and Importance of Security Intelligence
Role of Security Intelligence in Splunk ES
Risk Analysis in Security Intelligence for Splunk ES
The Risk Analysis Dashboard in ES
Understanding Risk Scoring in Enterprise Security: A Case Study with JIT Inc.
Effective use of Risk Analysis Dashboard
Web Intelligence
Web Intelligence Dashboards
HTTP Category Analysis Dashboard
HTTP User Agent Analysis dashboard
New Domain Analysis Dashboard
URL Length Analysis Dashboard
Hands-On Web Intelligence with Splunk ES at JIT Inc.
User Intelligence
User Intelligence Dashboards
Asset and Identity Investigator dashboards
User Activity Monitoring
Access Anomalies dashboard
Hands-On User Intelligence with Splunk ES at JIT Inc.
Threat Intelligence.
Threat Intelligence Dashboards
Threat Artifacts dashboard
Hands-On Threat Intelligence with Splunk ES at JIT Inc.
Protocol Intelligence
Protocol Intelligence dashboards
Traffic Size Analysis
SSL Search
Email Activity
Email Search
Hands-On Protocol Intelligence with Splunk ES at JIT Inc.
Case Studies
8. Forensic Investigation in Security Domains
Forensic Investigation in Security Domains
Key Security Domains
Access Domain
Key Components of ES in the Access Domain
Access Domain Areas
Access Center
Access Tracker
Access Search
Account Management
Default Account Activity
Hands-On Access Domain Investigation with Splunk ES at JIT Inc.
Endpoint Domain
Endpoint Domain Areas
Malware Center
Malware Search and Operations Dashboard
System Center
Time Center
The Endpoint Changes
Update Center and Search
Hands-On Endpoint Domain Investigation with Splunk ES at JIT Inc.
Network Domain
Network Domain Areas
Network Traffic
Network Intrusion
Vulnerability
Web Traffic
Network Changes
The Port and Protocol Tracking
Hands-On Network Domain Investigation with Splunk ES at JIT Inc.
Identity Domain
Identity Domain Areas
Asset Data
Identity Data
User Session
Hands-On Identity Domain Investigation with Splunk ES at JIT Inc.
9. Splunk Integration with Other Security Tools
Introduction to Splunk and Security Tool Integrations
The role of Splunk in Security Operations Centers (SOCs)
The Importance of Integrating Security Tools for Effective Threat Detection and Response
Best Practices for Integrating Splunk with Security Tools
Data Normalization and Enrichment.
Use of Splunk Add-ons and Apps.
Notes:
Description based on publisher supplied metadata and other sources.
Description based on print version record.
Includes bibliographical references and index.
ISBN:
9788196815028
8196815026
OCLC:
1417196848

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account