Logstash is a useful tool for processing log files that accept data from multiple sources and different formats. Logstash easly process text-based logs and send…
Abstraction Involves the removal of characteristics from an entity in order to easily represent its essential properties. Acoustic Sensors Device that uses passive listening devices…
LDAP is the Lightweight Directory Access Protocol, a protocol used to access and manage Directory Servers such as Active directory. The Directory is a special…
Automated email notification for Active Directory User Locked Out and Password Reset events using Powershell. Windows Security Log Event ID 4740 indicates that a user…
All-or-Nothing-Transform with Reed-Solomon (AONT-RS) Integrates the AONT and erasure coding. This method first encrypts and transforms the information and the encryption key into blocks in…
Elasticsearch Curator helps to curate, or manage, the Elasticsearch indices and snapshots by getting the full list of indices from the Elasticsearch cluster as actionable…
BEST PRACTICE Please Plan first based on your requirements and verify your plan. A single cluster or segregated clusters ( by sourcetype, department, or use…
RSA is based on the great difficulty of integer factorization and is the most widely-used public-key cryptosystem used widely in e-commerce systems. Euclid algorithm and…
An Information Security Framework is designed to be flexible enough to be used both by organizations with mature cyber security and risk management programs and…