An attacker was able to gain access to an organization's perimeter firewall and made changes to allow wider external access and to steal data. Which of the following would have BEST provided timely identification of this incident?
A.
Implementing a data loss prevention (DLP) suite
B.
Deploying an intrusion prevention system (IPS)
C.
Deploying a security information and event management system (SIEM)
D.
Conducting regular system administrator awareness training
C. Deploying a security information and event management system (SIEM) would have BEST provided timely identification of this incident. SIEM systems collect and analyze log data from various security devices, such as firewalls, intrusion detection systems, and servers, and can identify and alert on suspicious or anomalous activity. In this scenario, a SIEM would have been able to detect the changes to the firewall and potentially the data exfiltration, and alert the security team in real-time or near real-time.
I selected B, because a SIEMs detection capability is heavily dependent on the data sources. IDS/IPS systems are common data sources for SIEMS, hence without IDS/IPS as a log source, there would not be any detection capabilities for SIEMs.
A Security Information and Event Management (SIEM) system is designed to provide real-time analysis of security alerts generated by various hardware and software systems. It can help in the timely detection of security incidents by monitoring and analyzing network and system logs. SIEM systems are effective in correlating and analyzing data from different sources, providing a comprehensive view of the security landscape and enabling organizations to respond quickly to potential security threats.
A security information and event management (SIEM) system is designed to collect, analyze, and correlate log and event data from various sources across an organization's network. It can detect anomalies, suspicious activities, and security events that may indicate a security incident. In the described scenario, a SIEM could have identified the unauthorized changes to the firewall rules and raised alerts for further investigation.
While data loss prevention (DLP) suites (option A) focus on preventing unauthorized data exfiltration, an intrusion prevention system (IPS) (option B) is designed to block or detect and respond to known and unknown threats. Regular system administrator awareness training (option D) is essential but may not have immediately identified the specific incident described. SIEM, with its ability to analyze network activities and events, is well-suited for detecting and responding to such incidents.
Im pretty sure the final and correct answer is C but what about BEST TIMELY IDENTIFICATION? Woudn't that makes the best option B, IPS device,? SIEM would take longer time to the detection process.
I had the same idea... however, you must realize the keyword "identification": this suggests the best answer is the SIEM, which analyzes data from various sources. Besides, the IPS is focused on prevention (Intrusion Prevention System) not in detection / identification. Therefore, best answer should be C
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Broesweelies
Highly Voted 1 year, 10 months agoJosef4CISM
Most Recent 2 months, 2 weeks agoOlaYiMiKa
3 months, 3 weeks agoViperhunter
12 months agoViperhunter
12 months agoraymon87
1 year, 3 months agoTixi23
1 year, 2 months agoJae_kes
1 year, 5 months agorichck102
1 year, 6 months agoAntonivs
1 year, 9 months ago