49
Image courtesy of Stuart Miles / FreeDigitalPhotos.net Mind Mapping automation in information security log analysis (C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Applications of Mind Mapping automation in the analysis of information security log files

  • Upload
    infoseg

  • View
    1.867

  • Download
    1

Embed Size (px)

DESCRIPTION

Applications of Mind Mapping automation in the analysis of information security logs files. Example using Endpoint Protector log files.

Citation preview

Page 1: Applications of Mind Mapping automation in the analysis of information security log files

Image courtesy of Stuart Miles / FreeDigitalPhotos.net

Mind Mapping automation in information security log analysis

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 2: Applications of Mind Mapping automation in the analysis of information security log files

Manually reviewing log files has the following problems:

• Time consuming

• Monotonous

• Difficult to prioritize events

• Difficult to visualize important events

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 3: Applications of Mind Mapping automation in the analysis of information security log files

Advantages of Mind Maps

• Visual display of information • Information grouped by device, date-time, type

of event and type of file • Flexible • Easy to add comments and callouts to the basic

Mind Map • Easy to share • Exportable to PDF, Word and HTML • Tree structure • Searchable

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 4: Applications of Mind Mapping automation in the analysis of information security log files

Example of application of Mind Mapping automation

Endpoint Protector

Data Loss Prevention solution

“Make sure sensitive data does not leave your network whether copied on devices, clipboard or through applications, online services and even as screen captures.”

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 5: Applications of Mind Mapping automation in the analysis of information security log files

Endpoint Protector

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 6: Applications of Mind Mapping automation in the analysis of information security log files

Log generated by Endpoint Protector

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 7: Applications of Mind Mapping automation in the analysis of information security log files

Example of a log file generated by Endpoint Protector

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 8: Applications of Mind Mapping automation in the analysis of information security log files

Mind Maps generated

• Events by device

• Events by date-time

• Events by type of event

• Events by type of file

• Events by user

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 9: Applications of Mind Mapping automation in the analysis of information security log files

EVENTS BY DEVICE

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 10: Applications of Mind Mapping automation in the analysis of information security log files

Log file processed with Mind Mapping automation

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 11: Applications of Mind Mapping automation in the analysis of information security log files

Overview

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 12: Applications of Mind Mapping automation in the analysis of information security log files

USB – 1

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 13: Applications of Mind Mapping automation in the analysis of information security log files

USB – 2 (Events)

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 14: Applications of Mind Mapping automation in the analysis of information security log files

USB - 2

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 15: Applications of Mind Mapping automation in the analysis of information security log files

Webcam

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 16: Applications of Mind Mapping automation in the analysis of information security log files

Network Adapter

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 17: Applications of Mind Mapping automation in the analysis of information security log files

WiFi Adapter

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 18: Applications of Mind Mapping automation in the analysis of information security log files

CD-ROM

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 19: Applications of Mind Mapping automation in the analysis of information security log files

EVENTS BY DATE-TIME

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 20: Applications of Mind Mapping automation in the analysis of information security log files

Level 1

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 21: Applications of Mind Mapping automation in the analysis of information security log files

Overview

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 22: Applications of Mind Mapping automation in the analysis of information security log files

Events in a day

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 23: Applications of Mind Mapping automation in the analysis of information security log files

Events in a day

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 24: Applications of Mind Mapping automation in the analysis of information security log files

Events in a day

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 25: Applications of Mind Mapping automation in the analysis of information security log files

EVENTS BY TYPE OF EVENT

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 26: Applications of Mind Mapping automation in the analysis of information security log files

Overview

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 27: Applications of Mind Mapping automation in the analysis of information security log files

Level 1

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 28: Applications of Mind Mapping automation in the analysis of information security log files

File read

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 29: Applications of Mind Mapping automation in the analysis of information security log files

File rename

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 30: Applications of Mind Mapping automation in the analysis of information security log files

File delete

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 31: Applications of Mind Mapping automation in the analysis of information security log files

Enabled

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 32: Applications of Mind Mapping automation in the analysis of information security log files

Disconnected

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 33: Applications of Mind Mapping automation in the analysis of information security log files

EVENTS BY TYPE OF FILE

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 34: Applications of Mind Mapping automation in the analysis of information security log files

Overview

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 35: Applications of Mind Mapping automation in the analysis of information security log files

Level 1

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 36: Applications of Mind Mapping automation in the analysis of information security log files

url file

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 37: Applications of Mind Mapping automation in the analysis of information security log files

AVI

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 38: Applications of Mind Mapping automation in the analysis of information security log files

Application

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 39: Applications of Mind Mapping automation in the analysis of information security log files

EVENTS BY USER LOGGED

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 40: Applications of Mind Mapping automation in the analysis of information security log files

Overview

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 41: Applications of Mind Mapping automation in the analysis of information security log files

Level 1

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 42: Applications of Mind Mapping automation in the analysis of information security log files

User: Alice Johnson

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 43: Applications of Mind Mapping automation in the analysis of information security log files

User: John Smith

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 44: Applications of Mind Mapping automation in the analysis of information security log files

REVIEW PROCESS

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 45: Applications of Mind Mapping automation in the analysis of information security log files

Review detail of a File delete

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 46: Applications of Mind Mapping automation in the analysis of information security log files

Mind Map of the events to review by user logged

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 47: Applications of Mind Mapping automation in the analysis of information security log files

Summary

• Mind Mapping automation is a very useful tool to analyze security logs

• It can be adapted to any type of log

• It reduces the analysis time

• It is very scalable

• It simplifies the analysis of log files

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 48: Applications of Mind Mapping automation in the analysis of information security log files

Image courtesy of Stuart Miles / FreeDigitalPhotos.net

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml

Page 49: Applications of Mind Mapping automation in the analysis of information security log files

Contact Information

• José M. Guerrero

[email protected]

• Slideshare Presentations

(C) Infoseg 2014 http://www.infoseg.com/mi_01_en.shtml