SIEM Defined: Glossaries and More All in One Resource!
How is SIEM defined? Why should you work to ensure you have SIEM defined? Having a hard time keeping up with InfoSec jargon? We’ve got you covered. Solutions Review’s A to Z SIEM and Security Analytics glossary has definitions for over 60 of the most popular terms and acronyms. Be sure to bookmark this page and check back on a regular basis as this page will see ongoing updates. And don’t forget to check out our 2017 SIEM and Security Analytics Buyer’s Guide for a complete market overview of the top 24 SIEM vendors, available here.A
Active Directory
A directory service that Microsoft developed for Windows domain networks.
Active Monitor
A network node that is responsible for management tasks.
Active Response
Active Response is a mechanism that provides a system with the capability to respond to an attack when it has been detected.
Advanced Persistent Threat (APT)
An advanced persistent threat (APT) is a type of network attack in which an unauthorized entity gains access to a network and stays there, undetected, for an extended amount of time. Usually, the perpetrator of an APT wants to escalate their privileges to steal data, rather than damaging the network, which would likely blow their cover.
Analytics
The discovery of meaningful patterns in data, usually revealed by an analytics software solution.
Application Programming Interface (API)
A set of subroutine definitions, protocols, and tools for building application software. These include, but aren’t limited to, Microsoft Windows API, C++ Standard Template Library, and Java APIs.
Audit
A security audit is a systematic evaluation of a company’s network and information security practices and policies.
B
Bandwidth
A measurement of the number of bits conveyed or processed (bit-rate) that are available or consumed in metric multiples of bits per second.
Big Data
Extensive data sets that may be analyzed to reveal patterns and trends and that are typically too complex to be dealt with using traditional processing techniques.
Big Data Analytics
The analysis of large volumes of data, or big data, pulled from a wide range of sources. In a security context, Big Data Analytics tools are used to discover patterns and connections within a network to find discrepancies that could reveal intruders.
Black Hat
A hacker with malicious intent.
Bot
A bot is a computer that is being controlled by a remote attacker.
Botnet
A botnet is a network of infected computers controlled by a remote attacker.
Breach
An incident that results in the disclosure of potential exposure of data.
C
Certified Information Systems Security Professional (CISSP)
The Information System Security Professional Certification is a vendor-neutral independent certification, offered by the International Information System Security Certification Consortium (ISC2). A CISSP is a security professional who has attained that certification.
Chief Information Officer (CIO)
A senior executive in an enterprise responsible for the information technology and computer systems that support enterprise goals.
Chief Information Security Officer (CISO)
A senior-level executive within an organization responsible for establishing and maintaining the enterprise vision, strategy, and program to ensure that information assets and technology are protected.
Compliance
In IT and data storage terminology, compliance refers to organizational compliance with government regulations regarding data storage and management and other IT processes.
Computer Fraud and Abuse Act (CFAA)
The Computer Fraud and Abuse Act (CFAA) of 1986 is United States legislation that made it a federal crime to access a protected computer without proper authorization.
Configuration Management Database (CmDb)
A database containing all necessary information about an organization’s IT systems, the components of those systems, and their relationships. In the context of a CmDb, all components of an IT system (software, hardware, personnel, etc.) are referred to as configuration items (CI) and are tracked by a configuration management process.
Cybersecurity
The practice of using preventative and reactive methods to protect networks and information from being attacked and compromised.
D
Dashboard
A tool that is used to create, deploy and analyze information. Typically, a dashboard will consist of a single screen and show various reports and other metrics that the organization is studying.
Database
A collection of data that is purposefully arranged for fast and convenient search and retrieval by business applications and Business Intelligence software.
Data Aggregation
Data aggregation is a process by which information (data) from disparate sources is gathered and expressed in one group for purposes of statistical analysis.
Data Exfiltration
The unauthorized transfer of data from a computer.
Data-flow Analysis
Gathering information about a program’s possible values, then using a control flow graph to determine optimization methods for the program.
Data Loss Prevention (DLP)
DLP products are tools that help network administrators prevent data loss (duh) by controlling which data end users may transfer.
Data Migration
Data Migration is the process of moving data between two or more storage systems, data formats, warehouses or servers.
Data Visualization
Transforming numerical data into a visual or pictorial context to assist users in better understanding what the data is telling them.
DDoS
In a distributed denial-of-service (DDoS) attack, a large number of compromised systems target a single system and overload its servers, causing a denial of service for legitimate users of the targeted system.
Deep Packet Inspection (DPI)
A network packet filtering process that examines data contained in a packet for non-compliance, viruses, malware, or other unwanted components.
E
Encryption
The process of transforming data into an unintelligible form so the original data either cannot be obtained or can be obtained only by using a decryption process.
Endpoint
An endpoint is any internet-connected device on a network.
Event
An action or the result of an action. Events are often logged and monitored for security purposes.
Event Correlation
Event correlation is a technique for making sense of a large number of events and pinpointing the few events that are important in that mass of information. In a security context, correlation is the act of linking multiple events together to detect strange behaviors.
Exploit
A term for any method used by hackers to gain unauthorized access to a network.
F
False Positive
A false positive is normal behavior on a network that is identified as malicious. Too many false positives can drown out true alerts.
FERPA
FERPA is an acronym for the Family Educational Rights and Privacy Act (also referred to as the Buckley Amendment, a federal law designed to protect the privacy of student education records. FERPA compliance is a necessity for schools and other educational institutions.
File Integrity Monitoring (FIM)
A process that validates the integrity of operating system and application software files using a verification method between the current file state and a known baseline state.
FISMA
The Federal Information Security Management Act (FISMA) is a United States Law, signed into law in 2002, that defines a framework to protect US government digital information, operations, and assets against threats.
Flow
A single transmission of data passing over a link during a conversation.
Flow Log
A collection of flow records.
Flow sources
The origins from which flow is captured. A flow source is classified as internal when flow comes from hardware installed on a managed host or it is classified as external when the flow is sent to a flow collector.
G
Gateway
A device or program used to connect networks or systems with different network architectures.
GLBA
The Gramm-Leach-Bliley Act (GLBA) is an act of US Congress that repealed part of the Glass-Steagall Act, and which regulates the collection and disclosure of private financial information.
GPG 13
The Good Practices Guide 13 is a UK regulation that stipulates that HMG organizations must follow protective monitoring processes for their HMG ICT systems to gain access to the UK Government Connect Secure Extranet (GCSX).
GRC
Governance, Risk and Compliance.
H
Hacker
A hacker is an individual that uses illicit system access methods and exploits to gain access to computer systems and networks, often for the purpose of sabotage and theft.
Heterogeneous Network
A network that connects devices with different operating systems (Apple, Microsoft, Linux, Toshiba, etc).
HIPAA
HIPAA is the acronym for the Health Insurance Portability and Accountability Act that was passed by Congress in 1996.
Honeypot
A trap set to detect, deflect or in some manner, counteract attempts at unauthorized use of information systems. Consists of computer data or a network site that appears to be part of a network but is actually isolated and monitored.
Hybrid IT
An organization manages (IT) resources, some in-house but uses cloud-based services for others.
I
Identification
Identification is the process by which an entity’s information is gathered and verified for accuracy.
Incident response
An organizational approach to addressing and managing the aftermath of a breach or attack (AKA an incident). An Incident Response Plan aims to limit damages incurred by an incident and bring down recovery time and costs.
Information Security
Defined by the SANS Institute as ” the processes and methodologies which are designed and implemented to protect print, electronic, or any other form of confidential, private and sensitive information or data from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption.”
Infrastructure
Information technology (IT) infrastructure is a combined set of hardware and virtual resources that support an overall IT environment.
Internet Protocol (IP)
The principal communications protocol for sending and receiving datagrams across network boundaries, connecting multiple networks together across the Internet.
Intrusion Detection and Prevention Systems
Intrusion Detection and Prevention Systems are network security appliances that monitor network and/or system activities for malicious activity.
L
Legacy Solution
An old or outdated software tool.
Local Area Network (LAN)
A computer network that connects devices within a limited space (schools, college campuses, office buildings, etc.)
Log files
Files that record either events that occur in an operating system or software or messages happening on communication software. For example, when a failed login to an E-mail system occurs, a log file is created to record that even.
Logging
The act of keeping a log for an extended period.
Log Aggregation
The practice of collecting log data in a centralized location where it can be analyzed more effectively.
Log management
The workflow, devices, procedures, policies and other systems in place governing the collection, aggregation, and analysis of network log data.
Log Source
Either the security equipment or the network equipment from which an event log originates.
M
Machine Learning
A type of artificial intelligence that provides computers with the ability to learn without being explicitly programmed to do so, focusing on the development of computer applications that can teach themselves to change when exposed to new data.
Malware
Any software that is intended to damage or disable computers and computer systems.
Metadata
Describes other data within a database and is responsible for an organization while an end-user sifts through collected data.
N
NERC CIP
The North American Electric Reliability Corporation Critical Infrastructure Protection plan (NERC CIP) is a set of requirements designed to secure North America’s bulk electric system.
Network Behavior Anomaly Detection
The continuous monitoring of a network for unusual events or trends. NBAD offers security in addition to that provided by traditional anti-threat applications such as firewalls, intrusion detection systems, antivirus software and spyware-detection software.
Network Monitoring
Using a system to constantly monitor a computer network(s) for hinderances or failures in the network’s components, which are then notified to network administrators for quick remediation.
Network Scanning
A procedure for identifying active hosts on a network, either for the purpose of attacking them or for network security assessment.
Network Security
A term that describes that the policies and procedures implemented to avoid the hacking and exploitation of a network and its resources.
Next Generation Firewall
A Next Generation Firewall is an integrated network platform that combines a traditional firewall capabilities with other filtering functionalities such as deep packet inspection (DPI), an intrusion prevention, and other techniques.
Node
An active electronic device that is attached to a network, and it’s capable of creating, receiving, or transmitting information over a communications channel.
O
Open Systems Interconnection Model (OSI model)
A conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to their underlying internal structure and technology. It’s presented in seven abstraction layers:
- Physical: Transmits and receives streams of binary sequences over a physical medium.
- Data Link: Two nodes connected by a physical layer reliably transmits data frames.
- Network: Structures and manages the addressing, routing, and traffic control of a multi-node network.
- Transport: Through segmentation, acknowledgment, and multiplexing, data segments between points on a network are reliably transmitted.
- Session: Manages communication sessions through recipient transmissions between two nodes.
- Presentation: The translation of data between a networking service and an application.
- Application: High-level Application programming interfaces (APIs)
Operations Security (OPSEC)
A process that involves the identification and protection of generally unclassified critical information or processes that can be used by a competitor or adversary to gain real information when pieced together.
P
Packet Segmentation
The process of dividing a data packet into smaller units for transmission over the network, and this usually happens at Layer 4 of the OSI model.
PCI DSS
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit cards from the major card schemes including Visa, MasterCard, American Express, Discover, and JCB.
Penetration Testing
Penetration testing, or pentesting is the act of testing a system, network, or applications for flaws and vulnerabilities.
Perimeter
The perimeter of a network is the boundary between the private and locally managed-and-owned side of a network and the public and usually provider-managed side of a network.
Ping
A utility to determine whether a specific IP Address is available.
Predictive Analytics
Solutions that help the user discover patterns in large data sets to predict future behavior.
R
Ransomware
A type of malware that weaponizes encryption to block access to a computer system or service until a ransom is paid.
Real-Time Analytics
The ability to use all available enterprise data as needed and usually involves streaming data that allows users to make decisions on the fly.
Remote Access Tool
A piece of software used to remotely access or control a computer.
Reporting
The collection of data from various sources and software tools for presentation to end-users in a way that is understandable and easy to analyze.
Rootkit
A rootkit is a toolkit, or a collection of programs, that allows administrator-level access to a network.
Route Analytics
A network monitoring technology \developed to analyze the routing protocols and structures in meshed IP Networks.
Routing Protocols
How routers communicate with each other, distributing information that enables them to select routes between any two nodes on a computer network.
S
Sandbox
A sandbox is a security mechanism for separating running programs. It is often used to execute untested code, or untrusted programs from unverified third parties, suppliers, untrusted users and untrusted websites.
Secure Sockets Layer (SSL)
The industry standard for transmitting secure data over the Internet. It is based on a system of trusted certificates issued by certificate authorities and recognized by servers.
Security Information and Event Management (SIEM)
Security Information and Event Management or SIEM (pronounced ‘sim’ as in SIMcard, or SimCity) is a term for software and services that combine security information management (SIM) tools, which are geared towards log collection and report generation, with security event management (SEM) tools, which focus on real-time event analytics, correlation, and alerting. SIEM solutions are complex systems that help organizations decrease the impact of advanced cyber attacks by proactively monitoring the network for irregular activity in real-time.
Security Event Management (SEM)
SEM solutions are software tools that centralize storage and interpretation of logs and events generated on a network. SEM is the real-time event monitoring, correlation, and notifications that most compliance regulations want you to have.
Security Information Management (SIM)
SIM solutions are tools that automate the collection, monitoring, and analysis of security-related data from computer logs.
Security+ Certification
An international, vendor-neutral professional certification provided by CompTIA for IT professionals who want to become certified in IT security.
Security Incident
A security incident, or a security event, is any notable change in the normal operations of a network. This could be a breach, a failure of a security policy, or merely a warning that there may be a threat to information or computer security.
Security Manager
A person that takes on security management tasks.
Security Policy
A security policy is a written document in an organization outlining how to protect the organization from threats, including computer security threats, and how to handle situations when they do occur.
Service Level Agreement (SLA)
A contract between a service provider or vendor and the customer that defines the level of service expected. SLAs are service-based and precisely define what the customer can expect to receive.
Software as a Service (SaaS)
A software delivery model in which software is licensed on a subscription basis and is centrally hosted and typically accessed by end-users using a client via a web browser.
SOX
Sarbanes–Oxley, Sarbox or SOX, is a United States federal law that set new or expanded requirements for all U.S. public company boards, management, and public accounting firms.SOX requires that all publicly held companies must establish internal controls and procedures for financial reporting to reduce the possibility of corporate fraud.
Software-Defined Wide-Area-Networks
These are used to connect enterprise networks over large geographic distances, including data centers and branch offices of a company.
Spyware
Software that allows a malicious actor to covertly gather information about another user’s computer activities by transmitting data from their device.
T
Targeted Attack
A cyberattack that aims to breach the security network of a specific organization.
Threat Intelligence
Information about current or potential attacks on an organization.
Trojan
In information security, a Trojan is a piece of malware disguised as a harmless program.
U
Unified Threat Management
According to Gartner, Unified threat management (UTM) is “a converged platform of point security products, particularly suited to small and midsize businesses (SMBs). Typical feature sets fall into three main subsets, all within the UTM: firewall/intrusion prevention system (IPS)/virtual private network, secure Web gateway security (URL filtering, Web antivirus [AV]) and messaging security (anti-spam, mail AV).”
User Behavior Analytics (UBA)
UBA is defined by Gartner, as a cybersecurity process aimed at the detection of insider threats, targeted attacks, and financial fraud via the analysis of patterns of human behavior. UBA solutions analysis large volumes of data about users on a network and then apply algorithms and statistical analysis to detect meaningful anomalies from those patterns, which could alert administrators to an imminent threat.
V
Virus
A self-replicating piece of code that is loaded onto a computer without its owner’s knowledge, typically for negative purposes.
Vulnerability
A vulnerability, or vuln, is a term referring to a flaw in a system, program, or network that can leave it open to attack. A vulnerability may also refer to a weakness in security procedures or even personnel.
Vulnerability Scanning
Vulnerability scanning is the act of scanning or inspecting a network for possible vulnerabilities, exploits, or security holes.
W
Web Server
A computer system that processes requests via Hypertext Transfer Protocol (HTTP), the basic network protocol used to distribute information on the internet.
White Hat
A white hat is a hacker who finds and discloses vulnerabilities before they can be used with malicious intent.
Wide Area Network (WAN)
A network that extends over a larger geographical distance.
Z
Zero Day Attack
A zero-day is an exploit that utilizes a vulnerability on the same day that the vulnerability becomes known. Ie., There have been zero days between the discovery of the vulnerability (by information security professionals) and its exploitation.