ANALISIS LOG SISTEM PADA SECURITY INFORMATION AND EVENT MANAGEMENT UNTUK MENDETEKSI DATA EXFILTRATION
Technology is closely related to data. The existence of technology is to convey a collection of information easily and efficiently. Each individual or organization exchanges information for a specific purpose, and much of that information has a high level of security. The importance of monitoring ev...
Saved in:
Main Author: | |
---|---|
Format: | Book |
Published: |
2022-07-01.
|
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000 am a22000003u 4500 | ||
---|---|---|---|
001 | repoupnvj_19760 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Tiara Sakinah, . |e author |
245 | 0 | 0 | |a ANALISIS LOG SISTEM PADA SECURITY INFORMATION AND EVENT MANAGEMENT UNTUK MENDETEKSI DATA EXFILTRATION |
260 | |c 2022-07-01. | ||
500 | |a http://repository.upnvj.ac.id/19760/1/ABSTRAK.pdf | ||
500 | |a http://repository.upnvj.ac.id/19760/14/AWAL.pdf | ||
500 | |a http://repository.upnvj.ac.id/19760/3/BAB%201.pdf | ||
500 | |a http://repository.upnvj.ac.id/19760/4/BAB%202.pdf | ||
500 | |a http://repository.upnvj.ac.id/19760/5/BAB%203.pdf | ||
500 | |a http://repository.upnvj.ac.id/19760/6/BAB%204.pdf | ||
500 | |a http://repository.upnvj.ac.id/19760/7/BAB%204.pdf | ||
500 | |a http://repository.upnvj.ac.id/19760/8/BAB%205.pdf | ||
500 | |a http://repository.upnvj.ac.id/19760/10/DAFTAR%20PUSTAKA.pdf | ||
500 | |a http://repository.upnvj.ac.id/19760/11/RIWAYAT%20HIDUP.pdf | ||
500 | |a http://repository.upnvj.ac.id/19760/13/HASIL%20PLAGIARISME.pdf | ||
500 | |a http://repository.upnvj.ac.id/19760/12/ARTIKEL_KI.pdf | ||
520 | |a Technology is closely related to data. The existence of technology is to convey a collection of information easily and efficiently. Each individual or organization exchanges information for a specific purpose, and much of that information has a high level of security. The importance of monitoring every piece of information is a rule that can not be missed by every individual or organization. Lack of awareness on data security provokes crime by stealing such data or commonly called xfiltration data. To overcome the above, the author uses Security Information and Event Management or abbreviated siem. SIEM is a method of collecting, analyzing, alerting ports, and automating responses to an incident. This research is expected toexpand the results of testing and analysis and provide recommendations for solutions that can be done to overcome exfiltration data in SIEM | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
546 | |a id | ||
690 | |a QA75 Electronic computers. Computer science | ||
690 | |a QA76 Computer software | ||
690 | |a U Military Science (General) | ||
655 | 7 | |a Thesis |2 local | |
655 | 7 | |a NonPeerReviewed |2 local | |
787 | 0 | |n http://repository.upnvj.ac.id/19760/ | |
856 | 4 | 1 | |u http://repository.upnvj.ac.id/19760/ |z Link Metadata |