One of the methods to identify, process and gain visibility into a network is Network Security Monitoring(NSM). This talk will outline ample reasons for implementing NSM in a network and the various ways to do it.
For more conversations on network security, and security in general, follow hasgeek.com/rootconf
Timestamp
00:00 Speaker Introduction
00:36 Understanding Attack Dwell Time
01:25 Why is 'Attacker Dwell Time' important?
02:14 Understanding Security 1% Idea
02:47 The Sony Hack
03:39 The Microsoft Hack
04:22 The approach towards Security
05:12 What is Network Security Monitoring(NSM)?
06:04 Hardware Components required for NSM
07:01 Software set up for NSM
07:20 What is Zeek?
07:56 What is Suricata?
08:13 What is Security Onion?
08:31 Flat Network Architecture for NSM
09:08 Demo
22:44 Alternatives to no SPAN/TAP
23:45 Resources
23:55 Speaker's contact details
24:02 QnA
Смотрите видео An introduction to Network Security Monitoring (NSM) (and how to do it yourself) онлайн без регистрации, длительностью часов минут секунд в хорошем качестве. Это видео добавил пользователь Hasgeek TV 01 Январь 1970, не забудьте поделиться им ссылкой с друзьями и знакомыми, на нашем сайте его посмотрели 929 раз и оно понравилось 12 людям.