SlideShare a Scribd company logo
1 of 4
Download to read offline
CryptTech Inc.
CryptTECH
CryptoSIM, CryptoLOG, CryptoSPOT
Information Security Intelligence
CryptoSIM
Executive’s Brief
IT threats against organizations are increasing day by day. These threats
may be in forms of worms, viruses, Trojans, phishing and similar attacks
deployed by internal or external attackers, causing fatal events for
companies like company’s secrets theft. Firewalls or attack prevention
systems are capable of preventing the placement of all intricate worms or
rootkits in an in-house computer. Employee’s PC can easily get infected
with malwares from an infected web sites or social network applications
accessed by them.
Nowadays, Trojans, worms and viruses are specifically programmed for
firms and access information can be gathered due to phishing and social
engineering attacks. Such threats have made systems vulnerable to
attacks which is not preventable with normal IDS systems. Harmful codes
specifically developed for companies cannot be detected by anti-virus
systems operating on signature-basis. Attacks structures are getting
updated and more and more complex. Furthermore attacks to business
applications are harder to identify by firewalls and detection systems
constituting the border protection software. Recent Security violations
especially in regard to cellular phones proved that each mobile device,
server, client, notebook or any other smart device are prone to security
vulnerabilities.
As threats are becoming more sophisticated and mobile devices are
exposed to attacks, signature-based detection systems cannot detect
attacks. As information security increasingly turns into a chaotic
structure, all systems, servers, mobile devices and business application
logs should be gathered and analyzed, correlated, differentiated, and
their anomalies should be examined. These billions records cannot be
examined and inspected by human resources. Therefore, automated
systems are required to do the analysis and find the correlations using
correlation directives which are the artificial intelligence. Systems named
as SIEM can make such analysis and correlations. CryptoSIM is an
integrated Security Information and Event Management system
representing unique correlation and analysis via its correlation directives.
CryptoSIM proactively captures the log data, and provides the possibility
to analyze and diagnose threats and anomalies and notifies existence of
potential threats.
IT teams can use CryptoSIM to meet the security management necessities
beside legal compliance mandates apart from security analysis and
warnings. They can test the existing compatibility levels using
compatibility template reports available in CryptoSIM.
CryptoSIM provides a thorough analysis of event data and plenty of
reporting templates over audit records, it ensures first-hand analysis for
both existing security units and supervisors.
Normalization
Normalization is in fact assigning a universal data structure format on
collected data for equivalent fields and then differentiate it over the log.
This process makes comparison and correlation calculation between
events possible within a unified schema and can be deployed in a plug-in
structure.
Categorization
Categorization is a method used to classify the logs. Events are translated
into a taxonomy based on their category and sub-category.
Unification
Unification is simplification of recurring events into a single event.
Event Correlation
Correlation is the process of representing the relations between records
of incidents from multiple resources where correlation rules defines the
relation patterns among disparate events. In other words, it gives an all-
encompassing view of various evens relation for security behavioral
inspection. CryptoSIM correlation engine supports different real time
correlation types which are;
 Simple Correlation is examination through correlation of the
logs from one resource. Five erroneous connection trials to a
server within one minute is classified under this category.
 Logical Correlation is being implemented by the Correlation
Directives using logical tree structures. This type of structure is
also known as AND/OR tree, and is generally used in artificial
intelligence systems. When a condition node overlaps, the
correlation engine will head to sub-nodes. As the correlation
engine advances in overlapping conditions, the reliability of the
correlation varies in accordance. As more evidences are obtained
that there has been an attack going on, the probability of the
alarm increases as well. As an example; if an attack perceived by
the Detection system has passed from the firewall, and if a
request is received from the concerned server without two-
directional traffic; then the system reports this as ‘the attacked
server is influenced’. Here the logs of more than one system was
received and examined, and all conditions of the nodes were
met, so reliability probability is high.
 Contextual Correlation; this kind of correlations underline asset
value and type. If the asset value is high, then the risk value will
be high, and necessary alarms will be produced. If the asset
value is low (for example in test systems) then the risk value will
be low, and there will be a different reply form. The asset type
will be considered as well. For instant, when the attack detection
system perceives an attack that concerns Windows servers but
the attacked system is Linux, the priority value decreases.
 Cross correlation; cross correlation evaluates malicious data
additionally. The logs from security vulnerabilities and the logs
from attack detection systems are correlated, and the priority
value is determined accordingly.
 Retrospective correlation; While CryptoSIM is able to correlate
in the server memory in real time, it also can apply correlation
rules on the old logs to investigate the occurrence of the pattern
formations in the past.
 Hierarchical correlation; CryptoSIM can send the correlated
records to a superior correlation engine for further inspection.
The records kept in the first correlation can be re-correlated in
the next correlation engine according to distinct rules. As a result
N-level relation extraction becomes possible.
Risks Evaluation
Security Risk values calculation are supported by CryptoSIM in view of
their Asset value, Priority Value and Reliability value.
Incident Management
CryptoSIM also provides an incident management system which makes it
possible to apply controlling actions against security incidents.
CryptoLOG
Dashboard
CryptoLOG Dashboard screen can detect and represent all logs collected
and processed by the system according to their categories. The processor,
memory and disk performance can be monitored based on real time EPS -
Event per Second. Distribution of log sources are shown on monthly,
weekly and daily basis for total record numbers in charts and graphs on
dashboard screen. Thus, it depicts the total activity performance of the
network on same interface which simplifies monitoring to detect an
unusual process. CryptoLOG dashboard is equipped with scrolls and
enables abrupt access for supervisors to drill down on more detailed
information on the statistics of graphs and events. Automatic transition of
the system can be ensured by defining the desired number of Special
Indicators between statistical chart or alarm screens. This screen is
reflected using projection or LCD panel to allow illustration of hundreds of
charts in requested intervals.
Log Collection and Advanced Plug-in Structure
CryptoLOG log collection process can be performed through several
methods. The most used methods can be listed as OPSEC, Syslog, agent,
socket, SNMP, ODBC, OLE DB, native DB, WMI, remote registry, share,
samba, ftp, sftp or ssh. CryptoLOG offers a unique log processing
capacity with its advanced plug-in structure. Plug-in substructure uses
regex or CryptoLOG pattern processing functions. Both methods allow
extra plug-in’s to be written electing wizards or direct plug-in steps. Plug-
in codes can be written and added in addition to these methods.
Cryptolog involves C# and VB code operating engines by default. Desired
codes can be added within the plug-in.
CryptoLOG has over 300 prepared plug-ins by default. It is up to the user
which plug-in to use on the flexible powerful plug-in interface. Alarm
fields and messages can be defined on the plug-ins. When a log is
processed, it produces the alarm specified by the system user
independent from its confirming template or field. Up-to-date plug-ins
can be automatically drawn with a client over web repository.
Statistical Reports
In addition to statistical data, several kinds of reports on collected logs
statistics are available on the system. These reports can be formed
through query optionally in real time or scheduled on specified times by
user.
These reports are not static and are customizable based on their
application. Reports can be obtained over desired fields of the logs, and
can be conveyed to PDF, EXCEL, WORD and CSV environment.
Furthermore, statistical information about fields can be obtained over
plug-ins. As logs are collected, CryptoLOG keeps counters according to
their fields, and reports about these counters can be obtained on user’s
request immediately where normally demonstration of reports takes
hours of time if the system would not have real time calculations. The
rapid access to reports is one of the unique advantages of CryptoLOG
which takes just a few seconds in major systems with billions of records.
Immediate Statistical Reports
Immediate Statistic module can be obtained over a desired time interval
and ensures that analysis can be made over the desired field independent
from the statistical counters defined on the plug-in.
Traditional Reports
The reports menu on CryptoLOG provides the possibility to use over 300
prepared report templates. Reports can be produced according to the
desired parameters by selecting the proper report templates. Scheduled
reports can be taken from the system based on time dependent
applications. These reports can be sent to a specific person via e-mail on
request. Report templates can be easily prepared using report
preparation wizards, and if desired, regular expressions are described in
each log field (RegEx) on the advanced reporting section.
Compatibility reports can be taken over GLBA, SOX, HIPAA, FISMA, PCI
templates. All kinds of templates can be issued, and the firms can form
their compatibility templates in accordance with their own policies.
Forensic Analysis
CryptoLOG provides an advanced query for Forensic inspections. More
than one Query can be performed at a time. Queries can be made over
processed and differentiated log lines. Original logs are shown in queries
on request basis, and the results of such queries can be conveyed to PDF,
EXCEL, WORD and CSV format.
High Availability
CryptoLOG operates on active-passive basis with its grouping
substructure, and provides high availability. It can also operate on an
active-active basis, which allows load sharing on systems.
Non-Repudiation and 5651:
CryptoLOG takes the hashes of the logs it processes in accordance with its
inherent non-repudiation substructure and stamps them with time
stamps and signs with digital signature. This transaction is made every
second. Due to request; when log files are closed or at the end of the day,
they are stamped using timestamp service of UEKAE. CryptoLOG allows
selection of hash and signature algorithms used with parametric
substructure. RSA (1024 bit) or DSA are used by default in signature
algorithms. Hashing algorithms can be selected optionally between MD5,
SHA1, SHA216, and SHA512. Each log line can be signed on request basis.
Cryptolog ensures the possibility of external data transfer for legal
regulations. By selecting External data transfer for Legal Query in
Forensic Analysis section, the original log files, digital signature files with
hash and timestamp information and certificates can be transferred to
external storages.
Archive and Back-up
CryptoLOG can back-up the system configuration and plug-in at the
requested storage pool, and also can transfer the logs processed to
different environments reliably. Query can be made over archived logs on
request basis. Consequently, no additional transaction is necessary when
there is the need of query over archive records. CryptoLOG logs can be
compressed by a rate of 1:30. Analyses and reports can be made directly
over compressed data without any additional transaction.
User Management and Authorization
CryptoLOG offers an advanced authorized substructure in sense of menu
and function. User management is made on role basis, and the formed
roles can be assigned desired features and authorities by the system
administrators. Authorizations existing in this section go as low as the
plug-in level.
Agent Management:
Cryptolog agents can be administered from a centralized system. It can be
installed on remote servers and clients, and the configurations of the
agents can be made over the dashboard from the center. Groups can be
formed in this section, and policy/configuration can be sent to agents
under a certain group collectively. Besides, operating and non-operating
agents can also be checked over screens showing the operational status
of the agents.
CryptoSPOT
CryptoSPOT is a hotspot product. It is developed for practical use of the
cable or wireless internet service provided with or without a fee in multi-
user environments. In addition to users defined over it; it can ensure user
authorization connecting to 3rd
party databases such as SMS services,
Active Directory and hotel’s software. Thus, it offers flexible use in
different environments. It is possible to record the internet accesses over
hotspot system and send them to a third log storage systems.
User Definitions;
For each user, name, user name, password, timeout, period of use,
download/upload bandwidth limit, simultaneous use permit values can
be entered.
Mac address definition screen exists for devices that should be allowed to
the internet without passing over captive portal. Users who are asked to
obtain a password via SMS can be recorded by default, and can be
directly recorded over the login screen. Active Directory/LDAP resources
can be defined. All users in these resources can be permitted, and internet
allowance to only determined groups and/or different speeds can also be
defined. There are policy screens related to these transactions.
Configurations;
Entire network (IP, gateway, DNS and route) configuration can be made
over the interface. More than one hotspot network can be defined. DHCP
IP distribution interval etc. configuration for each network can be made
distinctively over the interface. Syslog configuration is available for logs to
logging systems. Furthermore welcome screen configurations are
available over the interface. Login methods that can be used in these
screens (SMS, local, Active directory) are available separately or within
the same profile. Not only different profile definition is possible for each
hotspot network, but also common login profile is available.
Users can be initiated only by arrangement of the concerned access
information within pre-defined SMS services. As to undefined SMS
services, their addition is quite easy with its modular structure.

More Related Content

What's hot

Blockchain for CyberSecurity | Blockchain and CyberSecurity
Blockchain for CyberSecurity | Blockchain and CyberSecurityBlockchain for CyberSecurity | Blockchain and CyberSecurity
Blockchain for CyberSecurity | Blockchain and CyberSecurityferiuyolasyolas
 
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...AM Publications
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IJNSA Journal
 
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...EMC
 
A proposed architecture for network
A proposed architecture for networkA proposed architecture for network
A proposed architecture for networkIJCNCJournal
 
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...Hassan EL ALLOUSSI
 
Threat Modeling - Writing Secure Code
Threat Modeling - Writing Secure CodeThreat Modeling - Writing Secure Code
Threat Modeling - Writing Secure CodeCaleb Jenkins
 
Secure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and SteganographySecure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganographyiosrjce
 
AWS Chicago May 22 Security event - Redlock CSI report
AWS Chicago May 22 Security event - Redlock CSI reportAWS Chicago May 22 Security event - Redlock CSI report
AWS Chicago May 22 Security event - Redlock CSI reportAWS Chicago
 

What's hot (16)

Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
 
Blockchain for CyberSecurity | Blockchain and CyberSecurity
Blockchain for CyberSecurity | Blockchain and CyberSecurityBlockchain for CyberSecurity | Blockchain and CyberSecurity
Blockchain for CyberSecurity | Blockchain and CyberSecurity
 
Ips and its types
Ips and its typesIps and its types
Ips and its types
 
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
 
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...
 
A proposed architecture for network
A proposed architecture for networkA proposed architecture for network
A proposed architecture for network
 
02.security systems
02.security systems02.security systems
02.security systems
 
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
 
The Spark
The SparkThe Spark
The Spark
 
Threat Modeling - Writing Secure Code
Threat Modeling - Writing Secure CodeThreat Modeling - Writing Secure Code
Threat Modeling - Writing Secure Code
 
Reveelium Technical Overview - Datasheet EN
Reveelium Technical Overview - Datasheet ENReveelium Technical Overview - Datasheet EN
Reveelium Technical Overview - Datasheet EN
 
Secure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and SteganographySecure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganography
 
5
55
5
 
4
44
4
 
AWS Chicago May 22 Security event - Redlock CSI report
AWS Chicago May 22 Security event - Redlock CSI reportAWS Chicago May 22 Security event - Redlock CSI report
AWS Chicago May 22 Security event - Redlock CSI report
 

Viewers also liked

Making Informed Choices That Move Us Beyond Our Default Future
Making Informed Choices That Move Us Beyond Our Default Future Making Informed Choices That Move Us Beyond Our Default Future
Making Informed Choices That Move Us Beyond Our Default Future Formicio
 
New developments in email marketing September 2012
New developments in email marketing September 2012New developments in email marketing September 2012
New developments in email marketing September 2012CIM East of England
 
Zen and the Art of Social Media
Zen and the Art of Social MediaZen and the Art of Social Media
Zen and the Art of Social MediaGolin
 
Cvtc presentation
Cvtc presentationCvtc presentation
Cvtc presentationJan Seiter
 
Summer @ Cal Lutheran Orientation
Summer @ Cal Lutheran OrientationSummer @ Cal Lutheran Orientation
Summer @ Cal Lutheran Orientationcallutheran
 
Next gen E-commerce. Focus on Mobile and Multichannel commerce
Next gen E-commerce. Focus on Mobile and Multichannel commerce Next gen E-commerce. Focus on Mobile and Multichannel commerce
Next gen E-commerce. Focus on Mobile and Multichannel commerce Globant
 
スクリプトで文字コード変換
スクリプトで文字コード変換スクリプトで文字コード変換
スクリプトで文字コード変換1000 VICKY
 
Interaktives Pecha Kucha: Scrum Percussion
Interaktives Pecha Kucha: Scrum PercussionInteraktives Pecha Kucha: Scrum Percussion
Interaktives Pecha Kucha: Scrum PercussionRolf Dräther
 
Экспресс регистрация
Экспресс регистрацияЭкспресс регистрация
Экспресс регистрацияkaanow
 
Angles
AnglesAngles
Anglesy3ehps
 
The role of informal providers in health markets
The role of informal providers in health marketsThe role of informal providers in health markets
The role of informal providers in health marketsJeff Knezovich
 

Viewers also liked (20)

Concurrent manager faqs
Concurrent  manager faqsConcurrent  manager faqs
Concurrent manager faqs
 
Making Informed Choices That Move Us Beyond Our Default Future
Making Informed Choices That Move Us Beyond Our Default Future Making Informed Choices That Move Us Beyond Our Default Future
Making Informed Choices That Move Us Beyond Our Default Future
 
EBS_Digest_Issue4
EBS_Digest_Issue4EBS_Digest_Issue4
EBS_Digest_Issue4
 
New developments in email marketing September 2012
New developments in email marketing September 2012New developments in email marketing September 2012
New developments in email marketing September 2012
 
Romania
RomaniaRomania
Romania
 
Zen and the Art of Social Media
Zen and the Art of Social MediaZen and the Art of Social Media
Zen and the Art of Social Media
 
Cvtc presentation
Cvtc presentationCvtc presentation
Cvtc presentation
 
Presentation satovcha
Presentation satovchaPresentation satovcha
Presentation satovcha
 
Summer @ Cal Lutheran Orientation
Summer @ Cal Lutheran OrientationSummer @ Cal Lutheran Orientation
Summer @ Cal Lutheran Orientation
 
Next gen E-commerce. Focus on Mobile and Multichannel commerce
Next gen E-commerce. Focus on Mobile and Multichannel commerce Next gen E-commerce. Focus on Mobile and Multichannel commerce
Next gen E-commerce. Focus on Mobile and Multichannel commerce
 
Sonar qube configuration
Sonar qube configurationSonar qube configuration
Sonar qube configuration
 
Measurement of NY
Measurement of NYMeasurement of NY
Measurement of NY
 
スクリプトで文字コード変換
スクリプトで文字コード変換スクリプトで文字コード変換
スクリプトで文字コード変換
 
Corso lim lez 3
Corso lim   lez 3Corso lim   lez 3
Corso lim lez 3
 
123 mary
123 mary123 mary
123 mary
 
Interaktives Pecha Kucha: Scrum Percussion
Interaktives Pecha Kucha: Scrum PercussionInteraktives Pecha Kucha: Scrum Percussion
Interaktives Pecha Kucha: Scrum Percussion
 
Экспресс регистрация
Экспресс регистрацияЭкспресс регистрация
Экспресс регистрация
 
Angles
AnglesAngles
Angles
 
College1 12.10.2015
College1 12.10.2015College1 12.10.2015
College1 12.10.2015
 
The role of informal providers in health markets
The role of informal providers in health marketsThe role of informal providers in health markets
The role of informal providers in health markets
 

Similar to Crypto sim_cryptolog_cryptospot_v3

Context Driven Scalable SIEM Solution
Context Driven Scalable SIEM Solution Context Driven Scalable SIEM Solution
Context Driven Scalable SIEM Solution Ertugrul Akbas
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
 
Use Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiencyUse Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiencyJonathanPritchard12
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM AlienVault
 
SIEM for Beginners
SIEM for BeginnersSIEM for Beginners
SIEM for BeginnersBAKOTECH
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...AlienVault
 
2005 issa journal-simsevaluation
2005 issa journal-simsevaluation2005 issa journal-simsevaluation
2005 issa journal-simsevaluationasundaram1
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...swathi78
 
Big Data Security Analytic Solution using Splunk
Big Data Security Analytic Solution using SplunkBig Data Security Analytic Solution using Splunk
Big Data Security Analytic Solution using SplunkIJERA Editor
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...IEEEGLOBALSOFTSTUDENTSPROJECTS
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...IEEEMEMTECHSTUDENTPROJECTS
 
D03302030036
D03302030036D03302030036
D03302030036theijes
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation finalRizwan S
 
13 essential log_col_infog
13 essential log_col_infog13 essential log_col_infog
13 essential log_col_infoghuynhvanphuc
 
Changing the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoChanging the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoEMC
 
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTIONSECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTIONIJNSA Journal
 

Similar to Crypto sim_cryptolog_cryptospot_v3 (20)

Correlog Overview Presentation
Correlog Overview PresentationCorrelog Overview Presentation
Correlog Overview Presentation
 
Context Driven Scalable SIEM Solution
Context Driven Scalable SIEM Solution Context Driven Scalable SIEM Solution
Context Driven Scalable SIEM Solution
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
Use Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiencyUse Exabeam Smart Timelines to improve your SOC efficiency
Use Exabeam Smart Timelines to improve your SOC efficiency
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 
SIEM for Beginners
SIEM for BeginnersSIEM for Beginners
SIEM for Beginners
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
 
Surelog Intelligence
Surelog IntelligenceSurelog Intelligence
Surelog Intelligence
 
2005 issa journal-simsevaluation
2005 issa journal-simsevaluation2005 issa journal-simsevaluation
2005 issa journal-simsevaluation
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...
 
Big Data Security Analytic Solution using Splunk
Big Data Security Analytic Solution using SplunkBig Data Security Analytic Solution using Splunk
Big Data Security Analytic Solution using Splunk
 
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
2014 IEEE DOTNET PARALLEL DISTRIBUTED PROJECT A system-for-denial-of-service-...
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
 
SureLog SIEM
SureLog SIEMSureLog SIEM
SureLog SIEM
 
Sure log full
Sure log fullSure log full
Sure log full
 
D03302030036
D03302030036D03302030036
D03302030036
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
 
13 essential log_col_infog
13 essential log_col_infog13 essential log_col_infog
13 essential log_col_infog
 
Changing the Security Monitoring Status Quo
Changing the Security Monitoring Status QuoChanging the Security Monitoring Status Quo
Changing the Security Monitoring Status Quo
 
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTIONSECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
 

More from Mustafa Kuğu

PrismCRM-RealEstate-SalesCRM_byCode5Company
PrismCRM-RealEstate-SalesCRM_byCode5CompanyPrismCRM-RealEstate-SalesCRM_byCode5Company
PrismCRM-RealEstate-SalesCRM_byCode5CompanyMustafa Kuğu
 
CenturyDX-IT-Company
CenturyDX-IT-CompanyCenturyDX-IT-Company
CenturyDX-IT-CompanyMustafa Kuğu
 
Dataliva Company Brief 2024
Dataliva Company Brief 2024Dataliva Company Brief 2024
Dataliva Company Brief 2024Mustafa Kuğu
 
Right Consulting Turkiye - Eng.pptx
Right Consulting Turkiye - Eng.pptxRight Consulting Turkiye - Eng.pptx
Right Consulting Turkiye - Eng.pptxMustafa Kuğu
 
Three-S Retail Automation (AcilimSoft Product)
Three-S Retail Automation (AcilimSoft Product)Three-S Retail Automation (AcilimSoft Product)
Three-S Retail Automation (AcilimSoft Product)Mustafa Kuğu
 
Eng Three-S Hq (AcilimSoft Product)
Eng Three-S Hq (AcilimSoft Product)Eng Three-S Hq (AcilimSoft Product)
Eng Three-S Hq (AcilimSoft Product)Mustafa Kuğu
 
Telenity Solutions Brief
Telenity Solutions BriefTelenity Solutions Brief
Telenity Solutions BriefMustafa Kuğu
 
Netmera Presentation.pdf
Netmera Presentation.pdfNetmera Presentation.pdf
Netmera Presentation.pdfMustafa Kuğu
 
NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform Mustafa Kuğu
 
NTGapps DTB Platform.pdf
NTGapps DTB Platform.pdfNTGapps DTB Platform.pdf
NTGapps DTB Platform.pdfMustafa Kuğu
 
PRISMCRM_ENG_Real-Estate-CRM
PRISMCRM_ENG_Real-Estate-CRMPRISMCRM_ENG_Real-Estate-CRM
PRISMCRM_ENG_Real-Estate-CRMMustafa Kuğu
 
Inypay Pitch Deck - March 2023-Latest copy 2.pdf
Inypay Pitch Deck - March 2023-Latest copy 2.pdfInypay Pitch Deck - March 2023-Latest copy 2.pdf
Inypay Pitch Deck - March 2023-Latest copy 2.pdfMustafa Kuğu
 
Açık-Kaynak-Kod-Geçiş-Rehberi-2023.pdf
Açık-Kaynak-Kod-Geçiş-Rehberi-2023.pdfAçık-Kaynak-Kod-Geçiş-Rehberi-2023.pdf
Açık-Kaynak-Kod-Geçiş-Rehberi-2023.pdfMustafa Kuğu
 
Startup Business Models
Startup Business ModelsStartup Business Models
Startup Business ModelsMustafa Kuğu
 
Navigating VC Negotiations
Navigating VC NegotiationsNavigating VC Negotiations
Navigating VC NegotiationsMustafa Kuğu
 
Quantum Computing Market Report
Quantum Computing Market ReportQuantum Computing Market Report
Quantum Computing Market ReportMustafa Kuğu
 
Fintech Road Vision Post Event Report 2022
Fintech Road Vision Post Event Report 2022Fintech Road Vision Post Event Report 2022
Fintech Road Vision Post Event Report 2022Mustafa Kuğu
 
2023-State-of-Digital-Transformation_Final.pdf
2023-State-of-Digital-Transformation_Final.pdf2023-State-of-Digital-Transformation_Final.pdf
2023-State-of-Digital-Transformation_Final.pdfMustafa Kuğu
 

More from Mustafa Kuğu (20)

PrismCRM-RealEstate-SalesCRM_byCode5Company
PrismCRM-RealEstate-SalesCRM_byCode5CompanyPrismCRM-RealEstate-SalesCRM_byCode5Company
PrismCRM-RealEstate-SalesCRM_byCode5Company
 
KVKK-Kararlar.pdf
KVKK-Kararlar.pdfKVKK-Kararlar.pdf
KVKK-Kararlar.pdf
 
CenturyDX-IT-Company
CenturyDX-IT-CompanyCenturyDX-IT-Company
CenturyDX-IT-Company
 
Dataliva Company Brief 2024
Dataliva Company Brief 2024Dataliva Company Brief 2024
Dataliva Company Brief 2024
 
Right Consulting Turkiye - Eng.pptx
Right Consulting Turkiye - Eng.pptxRight Consulting Turkiye - Eng.pptx
Right Consulting Turkiye - Eng.pptx
 
Three-S Retail Automation (AcilimSoft Product)
Three-S Retail Automation (AcilimSoft Product)Three-S Retail Automation (AcilimSoft Product)
Three-S Retail Automation (AcilimSoft Product)
 
Eng Three-S Hq (AcilimSoft Product)
Eng Three-S Hq (AcilimSoft Product)Eng Three-S Hq (AcilimSoft Product)
Eng Three-S Hq (AcilimSoft Product)
 
Telenity Solutions Brief
Telenity Solutions BriefTelenity Solutions Brief
Telenity Solutions Brief
 
Netmera Presentation.pdf
Netmera Presentation.pdfNetmera Presentation.pdf
Netmera Presentation.pdf
 
NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
 
NTGapps DTB Platform.pdf
NTGapps DTB Platform.pdfNTGapps DTB Platform.pdf
NTGapps DTB Platform.pdf
 
PRISMCRM_ENG_Real-Estate-CRM
PRISMCRM_ENG_Real-Estate-CRMPRISMCRM_ENG_Real-Estate-CRM
PRISMCRM_ENG_Real-Estate-CRM
 
Inypay Pitch Deck - March 2023-Latest copy 2.pdf
Inypay Pitch Deck - March 2023-Latest copy 2.pdfInypay Pitch Deck - March 2023-Latest copy 2.pdf
Inypay Pitch Deck - March 2023-Latest copy 2.pdf
 
Açık-Kaynak-Kod-Geçiş-Rehberi-2023.pdf
Açık-Kaynak-Kod-Geçiş-Rehberi-2023.pdfAçık-Kaynak-Kod-Geçiş-Rehberi-2023.pdf
Açık-Kaynak-Kod-Geçiş-Rehberi-2023.pdf
 
Startup Business Models
Startup Business ModelsStartup Business Models
Startup Business Models
 
Navigating VC Negotiations
Navigating VC NegotiationsNavigating VC Negotiations
Navigating VC Negotiations
 
Quantum Computing Market Report
Quantum Computing Market ReportQuantum Computing Market Report
Quantum Computing Market Report
 
Product Metrics
Product MetricsProduct Metrics
Product Metrics
 
Fintech Road Vision Post Event Report 2022
Fintech Road Vision Post Event Report 2022Fintech Road Vision Post Event Report 2022
Fintech Road Vision Post Event Report 2022
 
2023-State-of-Digital-Transformation_Final.pdf
2023-State-of-Digital-Transformation_Final.pdf2023-State-of-Digital-Transformation_Final.pdf
2023-State-of-Digital-Transformation_Final.pdf
 

Recently uploaded

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Crypto sim_cryptolog_cryptospot_v3

  • 1. CryptTech Inc. CryptTECH CryptoSIM, CryptoLOG, CryptoSPOT Information Security Intelligence
  • 2. CryptoSIM Executive’s Brief IT threats against organizations are increasing day by day. These threats may be in forms of worms, viruses, Trojans, phishing and similar attacks deployed by internal or external attackers, causing fatal events for companies like company’s secrets theft. Firewalls or attack prevention systems are capable of preventing the placement of all intricate worms or rootkits in an in-house computer. Employee’s PC can easily get infected with malwares from an infected web sites or social network applications accessed by them. Nowadays, Trojans, worms and viruses are specifically programmed for firms and access information can be gathered due to phishing and social engineering attacks. Such threats have made systems vulnerable to attacks which is not preventable with normal IDS systems. Harmful codes specifically developed for companies cannot be detected by anti-virus systems operating on signature-basis. Attacks structures are getting updated and more and more complex. Furthermore attacks to business applications are harder to identify by firewalls and detection systems constituting the border protection software. Recent Security violations especially in regard to cellular phones proved that each mobile device, server, client, notebook or any other smart device are prone to security vulnerabilities. As threats are becoming more sophisticated and mobile devices are exposed to attacks, signature-based detection systems cannot detect attacks. As information security increasingly turns into a chaotic structure, all systems, servers, mobile devices and business application logs should be gathered and analyzed, correlated, differentiated, and their anomalies should be examined. These billions records cannot be examined and inspected by human resources. Therefore, automated systems are required to do the analysis and find the correlations using correlation directives which are the artificial intelligence. Systems named as SIEM can make such analysis and correlations. CryptoSIM is an integrated Security Information and Event Management system representing unique correlation and analysis via its correlation directives. CryptoSIM proactively captures the log data, and provides the possibility to analyze and diagnose threats and anomalies and notifies existence of potential threats. IT teams can use CryptoSIM to meet the security management necessities beside legal compliance mandates apart from security analysis and warnings. They can test the existing compatibility levels using compatibility template reports available in CryptoSIM. CryptoSIM provides a thorough analysis of event data and plenty of reporting templates over audit records, it ensures first-hand analysis for both existing security units and supervisors. Normalization Normalization is in fact assigning a universal data structure format on collected data for equivalent fields and then differentiate it over the log. This process makes comparison and correlation calculation between events possible within a unified schema and can be deployed in a plug-in structure. Categorization Categorization is a method used to classify the logs. Events are translated into a taxonomy based on their category and sub-category. Unification Unification is simplification of recurring events into a single event. Event Correlation Correlation is the process of representing the relations between records of incidents from multiple resources where correlation rules defines the relation patterns among disparate events. In other words, it gives an all- encompassing view of various evens relation for security behavioral inspection. CryptoSIM correlation engine supports different real time correlation types which are;  Simple Correlation is examination through correlation of the logs from one resource. Five erroneous connection trials to a server within one minute is classified under this category.  Logical Correlation is being implemented by the Correlation Directives using logical tree structures. This type of structure is also known as AND/OR tree, and is generally used in artificial intelligence systems. When a condition node overlaps, the correlation engine will head to sub-nodes. As the correlation engine advances in overlapping conditions, the reliability of the correlation varies in accordance. As more evidences are obtained that there has been an attack going on, the probability of the alarm increases as well. As an example; if an attack perceived by the Detection system has passed from the firewall, and if a request is received from the concerned server without two- directional traffic; then the system reports this as ‘the attacked server is influenced’. Here the logs of more than one system was received and examined, and all conditions of the nodes were met, so reliability probability is high.  Contextual Correlation; this kind of correlations underline asset value and type. If the asset value is high, then the risk value will be high, and necessary alarms will be produced. If the asset value is low (for example in test systems) then the risk value will be low, and there will be a different reply form. The asset type will be considered as well. For instant, when the attack detection system perceives an attack that concerns Windows servers but the attacked system is Linux, the priority value decreases.  Cross correlation; cross correlation evaluates malicious data additionally. The logs from security vulnerabilities and the logs from attack detection systems are correlated, and the priority value is determined accordingly.  Retrospective correlation; While CryptoSIM is able to correlate in the server memory in real time, it also can apply correlation rules on the old logs to investigate the occurrence of the pattern formations in the past.  Hierarchical correlation; CryptoSIM can send the correlated records to a superior correlation engine for further inspection. The records kept in the first correlation can be re-correlated in the next correlation engine according to distinct rules. As a result N-level relation extraction becomes possible. Risks Evaluation Security Risk values calculation are supported by CryptoSIM in view of their Asset value, Priority Value and Reliability value.
  • 3. Incident Management CryptoSIM also provides an incident management system which makes it possible to apply controlling actions against security incidents. CryptoLOG Dashboard CryptoLOG Dashboard screen can detect and represent all logs collected and processed by the system according to their categories. The processor, memory and disk performance can be monitored based on real time EPS - Event per Second. Distribution of log sources are shown on monthly, weekly and daily basis for total record numbers in charts and graphs on dashboard screen. Thus, it depicts the total activity performance of the network on same interface which simplifies monitoring to detect an unusual process. CryptoLOG dashboard is equipped with scrolls and enables abrupt access for supervisors to drill down on more detailed information on the statistics of graphs and events. Automatic transition of the system can be ensured by defining the desired number of Special Indicators between statistical chart or alarm screens. This screen is reflected using projection or LCD panel to allow illustration of hundreds of charts in requested intervals. Log Collection and Advanced Plug-in Structure CryptoLOG log collection process can be performed through several methods. The most used methods can be listed as OPSEC, Syslog, agent, socket, SNMP, ODBC, OLE DB, native DB, WMI, remote registry, share, samba, ftp, sftp or ssh. CryptoLOG offers a unique log processing capacity with its advanced plug-in structure. Plug-in substructure uses regex or CryptoLOG pattern processing functions. Both methods allow extra plug-in’s to be written electing wizards or direct plug-in steps. Plug- in codes can be written and added in addition to these methods. Cryptolog involves C# and VB code operating engines by default. Desired codes can be added within the plug-in. CryptoLOG has over 300 prepared plug-ins by default. It is up to the user which plug-in to use on the flexible powerful plug-in interface. Alarm fields and messages can be defined on the plug-ins. When a log is processed, it produces the alarm specified by the system user independent from its confirming template or field. Up-to-date plug-ins can be automatically drawn with a client over web repository. Statistical Reports In addition to statistical data, several kinds of reports on collected logs statistics are available on the system. These reports can be formed through query optionally in real time or scheduled on specified times by user. These reports are not static and are customizable based on their application. Reports can be obtained over desired fields of the logs, and can be conveyed to PDF, EXCEL, WORD and CSV environment. Furthermore, statistical information about fields can be obtained over plug-ins. As logs are collected, CryptoLOG keeps counters according to their fields, and reports about these counters can be obtained on user’s request immediately where normally demonstration of reports takes hours of time if the system would not have real time calculations. The rapid access to reports is one of the unique advantages of CryptoLOG which takes just a few seconds in major systems with billions of records. Immediate Statistical Reports Immediate Statistic module can be obtained over a desired time interval and ensures that analysis can be made over the desired field independent from the statistical counters defined on the plug-in. Traditional Reports The reports menu on CryptoLOG provides the possibility to use over 300 prepared report templates. Reports can be produced according to the desired parameters by selecting the proper report templates. Scheduled reports can be taken from the system based on time dependent applications. These reports can be sent to a specific person via e-mail on request. Report templates can be easily prepared using report preparation wizards, and if desired, regular expressions are described in each log field (RegEx) on the advanced reporting section. Compatibility reports can be taken over GLBA, SOX, HIPAA, FISMA, PCI templates. All kinds of templates can be issued, and the firms can form their compatibility templates in accordance with their own policies.
  • 4. Forensic Analysis CryptoLOG provides an advanced query for Forensic inspections. More than one Query can be performed at a time. Queries can be made over processed and differentiated log lines. Original logs are shown in queries on request basis, and the results of such queries can be conveyed to PDF, EXCEL, WORD and CSV format. High Availability CryptoLOG operates on active-passive basis with its grouping substructure, and provides high availability. It can also operate on an active-active basis, which allows load sharing on systems. Non-Repudiation and 5651: CryptoLOG takes the hashes of the logs it processes in accordance with its inherent non-repudiation substructure and stamps them with time stamps and signs with digital signature. This transaction is made every second. Due to request; when log files are closed or at the end of the day, they are stamped using timestamp service of UEKAE. CryptoLOG allows selection of hash and signature algorithms used with parametric substructure. RSA (1024 bit) or DSA are used by default in signature algorithms. Hashing algorithms can be selected optionally between MD5, SHA1, SHA216, and SHA512. Each log line can be signed on request basis. Cryptolog ensures the possibility of external data transfer for legal regulations. By selecting External data transfer for Legal Query in Forensic Analysis section, the original log files, digital signature files with hash and timestamp information and certificates can be transferred to external storages. Archive and Back-up CryptoLOG can back-up the system configuration and plug-in at the requested storage pool, and also can transfer the logs processed to different environments reliably. Query can be made over archived logs on request basis. Consequently, no additional transaction is necessary when there is the need of query over archive records. CryptoLOG logs can be compressed by a rate of 1:30. Analyses and reports can be made directly over compressed data without any additional transaction. User Management and Authorization CryptoLOG offers an advanced authorized substructure in sense of menu and function. User management is made on role basis, and the formed roles can be assigned desired features and authorities by the system administrators. Authorizations existing in this section go as low as the plug-in level. Agent Management: Cryptolog agents can be administered from a centralized system. It can be installed on remote servers and clients, and the configurations of the agents can be made over the dashboard from the center. Groups can be formed in this section, and policy/configuration can be sent to agents under a certain group collectively. Besides, operating and non-operating agents can also be checked over screens showing the operational status of the agents. CryptoSPOT CryptoSPOT is a hotspot product. It is developed for practical use of the cable or wireless internet service provided with or without a fee in multi- user environments. In addition to users defined over it; it can ensure user authorization connecting to 3rd party databases such as SMS services, Active Directory and hotel’s software. Thus, it offers flexible use in different environments. It is possible to record the internet accesses over hotspot system and send them to a third log storage systems. User Definitions; For each user, name, user name, password, timeout, period of use, download/upload bandwidth limit, simultaneous use permit values can be entered. Mac address definition screen exists for devices that should be allowed to the internet without passing over captive portal. Users who are asked to obtain a password via SMS can be recorded by default, and can be directly recorded over the login screen. Active Directory/LDAP resources can be defined. All users in these resources can be permitted, and internet allowance to only determined groups and/or different speeds can also be defined. There are policy screens related to these transactions. Configurations; Entire network (IP, gateway, DNS and route) configuration can be made over the interface. More than one hotspot network can be defined. DHCP IP distribution interval etc. configuration for each network can be made distinctively over the interface. Syslog configuration is available for logs to logging systems. Furthermore welcome screen configurations are available over the interface. Login methods that can be used in these screens (SMS, local, Active directory) are available separately or within the same profile. Not only different profile definition is possible for each hotspot network, but also common login profile is available. Users can be initiated only by arrangement of the concerned access information within pre-defined SMS services. As to undefined SMS services, their addition is quite easy with its modular structure.