Informatică economică (Jan 2024)

Overview of Security Information and Event Management Systems

  • Cosmin MACANEATA

DOI
https://doi.org/10.24818/issn14531305/28.1.2024.02
Journal volume & issue
Vol. 28, no. 1
pp. 15 – 24

Abstract

Read online

Organizations face continuous risks of cybersecurity breaches and malicious activities. Reviewing logs is a critical activity to identify these threats, but the large volume of systems and data often presents an insurmountable challenge. As IT infrastructures expand, logs multiply exponentially, making the traditional manual log analysis extremely difficult and prone to missing key events. Also, this high volume of information combined with the uncorrelation of logs makes traditional approaches ineffective, especially in detecting sophisticated attacks. The solution to this challenge is deploying a Security Information and Event Management (SIEM) system, who collects, correlates, and analyze disparate logs from various sources in real-time, offering a complete overview of the organization's security. By automating the log review and providing detailed information, SIEM not only resolves the problem of log overload but also significantly improves threat detection and incident re-sponse capabilities. This paper presents the overview of SIEM systems and highlights the ways in which they can overcome these issues.

Keywords