Security
is the priority in any business organization. Current network architecture
extends across different platforms extending beyond traditional walls and
including data and information centers, endpoints, virtual environments, branch
offices and cloud computing Cisco.com, 2015).
Lack of access to current security intelligence, business organizations,
exposes their sensitive business data and information to hackers, malware,
intruders as well as data and information thieves without being aware that a
risk exists (Cisco.com, 2015). The most vulnerable areas business
infrastructures encountering new types of attacks include mobile devices,
mobile applications, web-enabled systems, social media, hypervisors, smart
devices, as well as home computers. According to analysis on security issues,
about 50 billion connected devices are likely to have been in use by 2020
(Cisco.com, 2015). The increasing use of connected devices shall lead to
increased problems with security. The connected end-to-end points shall promote
business operations through promoting business transactions, communication, and
dissemination of data and information. However, those points will act as most
vulnerable areas of implementing potential enterprise attacks. The security
individuals, therefore, are required to establish dynamic methods, tools, and
mechanisms that protect dynamic perimeter by creating an infinite number of
security points (Lisa, 2012). The current vulnerabilities within business
infrastructures can be solved through implementation of dynamic network
security monitoring tool referred to as Splunk (Cisco.com, 2015).
Purpose and Duties
Current
business infrastructure ensures information assurance through the
implementation of different software and hardware tool. Business systems are
protected using Intruder Prevention Systems (IPS), Intruder Detection Systems
(IDS), secure wireless networks, Computer End Points, as well as network
security analysis appliances (Global Innovation Technology, 2014). The purpose
of study research is to define effective and efficient implementation and
application of network security monitoring tools. The main task in research
operations includes implementation of best practices by running Splunk within
business systems and networks. My main duties are the configuring and setting
Splunk to help in analyzing security posture for multiple security devices. I
will participate in embedding Splunk within the network as well as systems that
already exist within the network.
Company Operations
I
will work with major network and security companies in the market such as
CITRIX within the department of information assurance. The aim and objective of
Citrix company are the provisions of Network support through providing network
tools and devices for securing and monitoring Local Area Networks (LAN), Wide
Area Networks (WAN), the Internet and Demilitarized Zone (DMZ) (Global
Innovation Technology, 2014). The main
activities in session shall include analyzing security posture for multiple
business enterprise devices using Splunk. Setting and configuring Splunk tool
to work effectively with user-friendly dashboards as well as providing Splunk
for helping security individuals in auditing users within systems report for
compliance as well as risks mitigation. Security assurance department will
mainly deal with monitoring cyber threats and malicious activities within connected
networks. Splunk security apps such as
Symantec Deep Sight Security Intelligence is applied in running networks
through ensuring effective fighting of cyber crimes (Global Innovation
Technology, 2014). The department ensures the provision of the following data
and information to support the mission and objectives aims of Citrix.
- Getting
information about the current threats posed against organization data and
information
- Drilling
down on specific events to analyze recurring threats
- Analyzing
most hostile, reputation, as well as confidential values of a given
harmful computer IP URL data
- Providing breakdown of malicious IP addresses within the network.
Methodology
Action Research Methodology
Action
research methodology refers to an approach in which researcher collaborates
with experts in a particular field of study with a purpose of developing a
solution to a particular problem (Bryman, & Bell, 2011). The research
methodology is characterized process involving collaborative inquiry whereby
researcher interacts with workers, experts, as well consultants within the
field of study. It is a process of
inducing social change by identifying problems and their appropriate solution.
It is usually applied with a purpose of improving a particular situation,
practices or revising a specific condition in business operations (Collis,
& Hussey, 2003). Action research is the type of social experiment that
implements a specific method to test hypothesis experienced in real world
environment. It deals with specific business realities focusing on specific
social and local organizational factors while conducting action research. It
adopts critical approaches that guide in providing most effective change. It
has a basic model consisting of four
stages referred to as planning, acting, observation and reflection.
History of Action Research
Kurt
Lewin discovered the process action research in the early 1940s. According to
Lewin, Action research involved a group of participants or practitioners and
experts in science (Altrichter, Kemmis, McTaggart, & Zuber-Skerritt, 2002).
Practitioners conducted a research process, which involved collaboration,
inquiry and social interactions. His method was characterized by a cycle of
events whereby practitioners participated in social activities with social
scientists. The process involved spiral stages of the self-reflective cycle.
According to Lewin, the cycles consisted of planning stage to initiate change,
implementing or acting stage, observation stage and the planning stage
(Altrichter, Kemmis, McTaggart, & Zuber-Skerritt, 2002). Action research
has been applied in different settings. Among the most common applications
includes improving education processes such as learning curriculum to include
sports and gaming. It has also been applied by social scientists in improving
psychology, engineering, nursing and social, political sectors. Action research
has paved the way to other major research methodologies as well as guiding
scientists in redefining scientific methodologies that existed (Altrichter,
Kemmis, McTaggart, & Zuber-Skerritt, 2002).
Justification of Action Research
Action
research process supports the process of learning. It enhances better
understanding by allowing proper understanding of specific situations, needs,
and specification. It guides researchers towards getting the appropriate
problem that requires a particular change. The methodology is the most
appropriate in providing solutions to network security using Splunk tool
(Bryman, & Bell, 2011). It will facilitate effective and efficient
understanding of the principles and standards that must be applied. Through
collaboration and interaction process with experts, the methodology shall
provide a better environment for learning configurations and settings required
while implementing Splunk tool. Systematically procedures implemented through
action research cycle shall facilitate delivering of high quality and
acceptable projects that satisfy users. The participatory research shall
guarantee proper mentorship as well as the effective acquisition of knowledge,
skills, and experience required as a profession while performing my duties and
career (Bryman, & Bell, 2011).
Stages of Action Research
The
stages of action research include planning, action, observation, and reflection
stage. The planning stage involves identifying and understanding the social
problem that requires a particular change or solution. Participants and social
scientists meet to schedule the procedures and approaches that should be
adopted (Altrichter, Kemmis, McTaggart, & Zuber-Skerritt, 2002). The second
stage is action stage which involves the implementation of the procedures
defined in the planning stage. The activities specified are implemented
according to schedule and agreed strategies (Altrichter, Kemmis, McTaggart,
& Zuber-Skerritt, 2002). The third
stage is observation stage. During observation, the consequences of actions
taken are evaluated. Researchers conduct data and information collection to
identify specific effects of the implemented action. The effects of change are
determined and its results evaluated (Altrichter, Kemmis, McTaggart, &
Zuber-Skerritt, 2002). The fourth step is the reflection stage. During
reflection stage, researchers and social scientists brainstorm to analyze, evaluate
and validate the effectiveness of change. The fourth step determines whether
the project will be terminated to implement another or another cycle can be
started to improve the applied change or to initiate next project.
Significance of Action Research
It
supports the development of projects from scratch because of easy generation of
new ideas that promote a better and positive change. The methodology is
informative, involving and knowledge oriented. It is most appropriate in
conducting objectives, aims and goals are not clearly defined. Action research
supports all other forms of study research thus can be applied in different domains.
The fact that it is repetitive and collaborative in nature all stakeholders are
easily involved in research process thus guaranteeing acceptable delivering of
projects (Collis, & Hussey, 2003).
Problem Statement
Splunk Network Security Literature Review
Ancient
tools for managing, controlling and monitoring Information Technology (IT)
infrastructure have failed to provide reliable security because of rampant
changes occurring in modern data and information centers (Splunk for IT
Operations, 2013). Although traditional troubleshooting and diagnosing was
based on manual operations, current advancements in technology require more
improved analytical systems (Splunk for IT Operations, 2013). Traditional
security issues could only handle cases dealing with systems performance.
Alternative
tools such as Splunk tools are highly versatile, scalable and reliable for
analyzing data and information. It combines all data engines and machine security
data and information with the intention of updating security individuals
concerning data and information security (Reybok, et al., 2015). Splunk
facilitates information and security assurance through collecting indexes and
live data and information from any source. Among the network equipment
monitored includes custom applications, application servers, web servers,
database servers, mail servers, virtual machines, operating systems,
hypervisors as well as other network utilities (Reybok, et al., 2015). The
Splunk tool guarantees effective and efficient operations since it does not
rely on parsers, adapters, or back-end databases for analyzing and processing
security concerns (Splunk for IT Operations, 2013).
Network
security control involves the implementation of inventory management and
control of software through defining the level of authorization. Changes to
software that contribute to security issues are accomplished through managing
software changes, whitelisting, and using vulnerability management tools
(Splunk Inc, 2016). Among the tools applied includes Titanium, IBM, BigFix,
Microsoft System Center, as well as Bit9 Security Platform (Splunk Inc,
2016). Splunk software is integrated
with various software systems to assist in securing network systems. The role
of Slunk software in network systems is to:
Splunk
helps in gathering data and information concerning installed software. It
monitors patches updates in a given system through implementation of scripting
inputs, set standards and specific scripts (Wilde, Hategan, Wozniak, Clifford,
Katz, & Foster, 2011). Splunk is well utilized in areas such as Splunk
Add-on for Microsoft Windows, UNIX and Linux network systems. The Splunk
software is mostly used to facilitate reporting and alerting administrators in
case of any vulnerability associated with software patches. It based on
performing analysis for each entry of software. It generates reports in the
form of XML, CSV, as well as other formats that correspond particular network
security problem (Splunk Inc, 2016). It is responsible for performing
correlations from different scripts and third-party tools through comparing
them with other enterprise based data and information sources. Splunk software
can be set and configured to perform all analysis operations on network systems
such as configuration management database (CMDB), harshly based whitelists
among other utilities (Gupta, et al., 2016). The significance of the Splunk
tool is providing accurate calculations, based on patterns, trends, and
behavior of data and information assets (Splunk Inc, 2016).
Splunk Applications in Enterprise
In
enterprises, security can be used in facilitating secure configurations that
determine processing and handling of information in real time (Gupta, et al., 2016).
Enterprise security is applied in identifying the various attack and hacking
behavior as well as misconfigurations that expose the network to vulnerable
environments. It can identify, verify and validate sensitive credential
characteristics such as password lengths as well their defined period
(Prabhakar, Pankanti, & Jain, 2003).
It works through displaying n contents on display units such as traffic
search, system center, and time center. The windows reveal parts of the system
that does not meet international standards of settings and configurations
(Prabhakar, Pankanti, & Jain, 2003). Splunk's evaluates data and
information repository systems on networks and provides all threats in a list.
Among the problems highlighted includes hash file values, malicious registry
keys, Internet Protocol (IP) addressing, domain naming issues, among another
IOC (Gupta, et al., 2016). The tool facilitates effective and efficient
handling of user accounts through maintaining restrictions, rights, and rules
of various accounts. It monitors areas such as operating systems levels
weaknesses on the enabled guest accounts, some lenient pseudo configurations,
as well as failure to define default accounts such as administrator and root
(Church, et al. 2015).
Benefits of Splunk Tool
Splunk
is a centralized network monitoring tool that guarantees provision of
intelligent security. analysts. It helps
in troubleshooting and diagnosing through determining areas prone to
vulnerabilities as well as sections having penetration weaknesses (Kim, Ma,
& Park, 2016). It provides prior updates concerning dangerous situations
such as hacking, denial of services, viruses attack, malware infections and
malicious scripts.
Splunk
tool facilitates real time processing; it has a large storage device for
enhancing high-level processing. Splunk tool supports input of data and
information that can exist in any format. It supports CVS, Json as well as
other formats. Splunk tool can be applied in setting and configuring of systems
to give alerts. It enhances sending of messages events and notifications during
initialization of machines or starting machine operations. Splunk tools provide
an accurate prediction of various resources needed during analysis processes.
It is also used for creating knowledge objects by deriving knowledge data and
information (Kim, Ma, & Park, 2016). It is also best applied for
facilitating operational objects and operational intelligence. Most common
applications of functionalities of Splunk tool include
Analyzing
systems performance such as processing power,
Troubleshooting
any failure conditions such as connection failures
Monitoring
business metrics and measures such as Key Performance Indicators (KPI)
Searching
and investigating particular outcome of processing resources, retrieving,
translating, and translation
Storing
and retrieving data and information from database systems as well as other
repository systems
The
characteristics of plunk tool are to facilitate systems operations such as
searching, analyzing and visualizing results on the databases. Splunk tool
ensures that the systems are well connected to the Systems as a service (SaaS)
settings and configurations. Splunk tools support both on premise and out of
premise backup and recovery procedures. Splunk tools also support various types
of plugin systems as well as the integration of various types of application
systems. Plunk's tools have the capability of connecting to input and output
data and information types for facilitating direct customer support (Prabhakar,
Pankanti, & Jain, 2003). The production of various documentation reveals
effective and efficient logic on writing systems logs. The aim and objective of
entire evaluation include Involved Splunk systems that implement machine
learning commands with a strong system that applies the use of work bench in
creating custom modeling using user utility issues. The systems use techniques,
such turnkey, out of box analysis focusing on developing effective management
of IT services and Security.
Proposal
The
Splunk tool was mainly set and configured to improve areas such as e-commerce.
Through benchmarking studies the industries that I observed applying Splunk
tool included Expedia. The major functions included monitoring health
applications as well as performance. Splunk tool ensures complete evaluation of
real time visibility especially for data and information that range of tens of
terabytes or above.
On
other areas such as cloud computing industries, Splunk is well known for
implementing standards in Software as a Service (SaaS) through the use of
Salesforce.com. I was capable of implementing Splunk dashboards in IT sector
for effective and efficient monitoring of customer experiences. The entire
systems encourage managers in performing analytical data to managers. It
equally guarantees complete troubleshooting of customer’s queries at a rate of
100,000 customers per second.
Problem Statement
Big
data concepts and storing of related data and information is a trend that
causes difficulties in analyzing business data and information. A major
challenge includes monitoring, tracking and checking technology infrastructure
within network systems. The network systems are also affected by security issues
such as lack of business application security procedures thus leading to
insights that affect performance and business results. Threats and vulnerable
attacks on systems are rampant a state that raises concerns on the best
technology to implement technological analysis. The future analysis shall
highly focus on building specific cases, applications, and tools such as IT
Service Intelligence, and User Behavior Analytics.
A
major problem includes solving issues corresponding to collecting of index
logs, machine data as well as other resources from database sources. The
problems associated with powerful searching analyzing and visualizing
capabilities associated with empowering different users. The tools applied
shall enhance autonomy, security as well as the direct implementation of all
analytical corrective measures on user accounts. Proposed technology is
intended to solve issues concerned with visibility and accessibility of online
premises, cloud computing technology, among other hybrid technology systems.
The scaling of systems vulnerabilities such as hacking, vulnerable attacks, as
well as failure to use and apply proper measures in the analysis systems shall
be solved using the appropriate tools that indicate collective solutions to the
entire systems. Finally, secure operations such as securing installation
systems, applications, and devices within systems are highly recommended
through applying technical methods. The Splunk technology is intended at
solving issues that occur when manual or physical methods are applied by
technicians to control and manage security. The system is intended to automate
security parameters that are certain in delivering most desirable security
using tools, software, and hardware, as well as human, intervene measures.
Iteration 1: Orientation to Slunk Network Security
The
introduction shall cover various network structures that require Slunk
technology. The study shall analyze components, features as well as utilities
of the network. The session shall determine the potential condition and status
of security within the network. Existing security measures and strategies shall
be analyzed as the major background of the study. Researchers shall classify
various software and hardware tools and their corresponding security requirements.
The iteration shall involve an introduction to Slunk applications. Introduction
shall cover infrastructure of the security, applications, and work with the
tool. It shall also incorporate introduction from on various networking
parameters applied to facilitate secure environment.
Iteration 2: Training, Seminars, and Meetings
The
session shall concentrate on collecting knowledge, skills, and experiences from
the different point of view. It shall involve interacting with experts in the
field of security for effective understanding how various security tools
operate. The activities involved are interviews, workshops as well as practical
learning about Splunk. The session shall include benchmarking studies in the
existing network systems to observe implementation and structure of Splunk.
Learning shall involve all appropriate methods and methodologies that can be
applied in the certain field. Training shall cover standards and ethical issues
that apply to various security measures. It shall also cover most important
elements of security such as Confidentiality, integrity, and availability.
Iteration 3: Data and Information Collection
The
goal of the study is providing high-level accessibility to security issues
encountered by various users. The methodologies applied in the research shall
include a questionnaire, observations, and interviews. The individuals included in the study
research shall include clients, stakeholders, managers, and directors. The
session shall define the problems within various environments such as a
business sector. Researchers shall perform needs and specifications analysis to
come up with needs and requirement deliverables. The session shall also perform
systems analysis to predict possible security vulnerabilities that can be
experienced within the systems. The session shall provide alternative solutions
to problems and deduce most appropriate technology to solve existing security
issues completely. Finally, the session shall define most desirable,
acceptable, and security-oriented approach worth implementing.
Iteration 4: Planning, Designing, and
infrastructure
The
final iteration shall involve defining a plan to implement solution selected.
The solution designed shall ensure that the proposal provides easy ways and
measures for decision making to network managers and systems. The design shall
ensure security individuals understands all security processes through
receiving alerts about incoming and ongoing individual host or group of hosts.
The session shall involve evaluation of the scope as well as schedule applied
in the implementation process. The session shall include conducting feasibility
studies to validate if the proposed solution is viable and worth
implementation. Other activities shall include budgeting and defining the
project checkpoints. The final activities shall include designing the
infrastructure of the proposed security systems. Hardware and software tools
shall be provided, input and output data and information shall be guaranteed as
well as other design requirements.
Iteration 1:
Orientation to Splunk Network Security
Plan
The iteration process is scheduled
to take about two weeks. The introduction session shall involve conducting
research through the web to discover modern technologies as well as areas that
implement Splunk tools. The session shall involve research from websites, from
books, as well as through libraries checking. The research operations shall
take two days. The research work shall a personal guidance far familiarizing
with Splunk technologies. Another period of three days shall be used to study
in details areas within the network where Splunk tools are applied. The session
shall involve meeting with experts as well as analyzing several network
infrastructures that apply the use of Splunk systems (R. W. Attar, Personal
communication, May 24, 2017). Research shall be required to perform
benchmarking network systems that analyze business operations using Splunk
technology. The first week activities shall be supervised by Mrs. Attar, the
Chief Systems Security (CSS). The first half of the second week during
orientation process shall include understanding the structure of the Splunk
system. The study shall perform analysis on the current planning and designing
of security measures. The study shall check on how various technologies are
applied to implement security. The researcher shall learn how a complete system
infrastructure is drawn as well as tools embedded within network systems (T. P.
Frank, Personal communication, May 25, 2017). Mr. Frank shall guide researchers
on covering various security infrastructures, applications, and a tool that’s
implement Splunk.
The second half of the second week
shall involve researchers classifying various software and hardware tools and
their corresponding security requirements. The session shall define criteria as
well as the strategies applied by Splunk tools to facilitate effective security
measures (H. K. Beth, Personal communication, May 27, 2017). Researchers shall
be expected to understand techniques as well as criteria applied by systems to
implement security parameters. Miss shall facilitate the session. Beth Chief
Information Officer (CIO).
Action
I took part in conducting internet
research studies to analyze various areas where Splunk technology is applied.
Among the domains where Splunk tools are vital to include providing security,
and compliance in business operations through eliminating frauds such as a
white collar. According to online research.It facilitates effective and efficient delivering of systems
applications on time and based on high level of accuracy. Through benchmarking operations, I managed to
visit most of the Internet of Things (IOT) and applied industries. Most domains where Splunk technology is
appropriate to include in collecting data and information from devices,
managing and controlling other systems, and being applied as sensors. Splunk
tools were also applied in Supervisory control and data acquisition (SCADA)
systems. Other uses included controlling operations of handheld devices such as
mobile phones and point of sale devices (R. W. Attar, Personal communication, June
1, 2017).
The structure of the Splunk systems
is composing of two main divisions. One of the divisions is a machine to
machine architecture as well as human to human architecture. Among the embedded
systems within Splunk tool include using processor-based architectures. It has
systems HVAC controllers, Smart electronic meters, Global Positioning Systems
(GPS) devices and Radio Frequency Identification (RFID) devices (T. P. Frank,
Personal communication, June 3, 2017). Other areas that incorporate spunk
includes automobile devices, medical devices, as well as other systems that
implement machine data and information.
The techniques applied in Splunk
systems include incorporation of systems software operations such as business
analysis. It implements principles of visibility and business intelligence. It
is based on learning situations to produce inferences such as trends and
patterns. It mainly uses criteria of diagnosing, as well finding and fixing
problems with and intention of fixing particular issues (H. K. Beth, Personal
communication, June 5, 2017).
Observation
The observations identify during
personal research has found that application of Splunk tool is vital especially
in managing to control and running business operations. The most effective and efficient operations
including in the field of network security, systems analysis as well as in
finding trends, patterns, and behavior. Machine learning is an application that
was most applicable in almost all fields. Significance technologies noted as
one of the implementers of Slunk include the big data technology, cloud
computing, and Internet of Things (IOT) (R. W. Attar, Personal communication, June
6, 2017). Direct applications of the Splunk tools is recording user
transactions, customer behavior, sensing security vulnerabilities, as well as
learning machine behavior. In security
operations within networked infrastructures, Plunk tools are set and configured
to provide effective and efficient incident response capabilities in business
operations.
The Splunk tool has high-level
usability techniques such as real-time correlation as well as in-depth
monitoring of systems across data and information sources. It performs analysis
that proofs effective statistical analysis for advanced pattern detection as
well as identification of threat and defense mechanisms. In networking, the
complexity of network utilities is made easy through the use of Splunk tools.
Tools guarantee complete resolving of problems, identifying infrastructural
services (T. P. Frank, Personal communication, June 7, 2017). It is a tool that
guarantees complete quality assurance regarding troubleshooting, isolation of
network problems as well as assuring that information and data security is
given priority. Among the data and information management platforms, the
software components observed during benchmarking process included Splunk
applications. It has several categories of applications such as VMware,
Microsoft, Cisco hardware, Microsoft Active Directory, and Citrix. The process
of coping with issues of compatibility Splunk supports alternative software
such as Linux Unix, Windows, and virtual technologies among others (H. K. Beth,
Personal communication, June 9, 2017).
Reflection
The main goal of orientation
process is to familiarize understand as well appreciate the various components
and contents of the Splunk tools. The orientation session has equipped me with
adequate resources that have highly led to complete appreciating the
functionalities of Splunk tools in technology. Among the successfully
introduced areas included business insight (R. W. Attar, Personal
communication, June 12, 2017). Splunk facilitates making better and informed
decision making through understanding various business analyzed information
that incorporates trends, patterns, and behavior. It enhances intelligence
support in the events concerning data and information security. The introduction session has also covered
areas such as the operations visibility implemented through maintaining records
for future references. Splunk guarantees proactive observations through
monitoring sensitive infrastructures such as networks. It facilitates effective
understanding of business issues, problems, and attacks before they strike in
the organization causing adverse effects on customer’s services, revenue, and
personal data (T. P. Frank, Personal communication, June 12, 2017).
Through research, Splunk is applied
in facilitating investigative analysis with the intention of bringing changes
within multiple data and information sources. The tools are vital in bringing
new methodologies of trailing attackers, intruders, and insiders. The tool
guarantees fast and effective responses within the shortest time. Research
involving orientation to the organization. Connections and embedding various
software systems is possible such as integrating relational data and
information databases, facilitating bi-directional connectivity, as well as
establishing Hadoop data and information linkage. The future analysis shall
facilitate effective and efficient implementation of future iterations through
incorporating the acquired knowledge.
Among the observed and future research work shall be based on Splunk
infrastructures that focus at learning g from huge business operations such as
Amazon Web Services (AWS) (H. K. Beth, Personal communication, June 14, 2017).
The achieved goals include
determining of various performances monitoring in categories such as monitoring
large scale, as well as enhancing distributed mission on critical applications.
I have understood that Splunk tool can be implemented in solving isolate
problems such as diagnosing, and troubleshooting issues. The entire operations
facilitate complete monitoring of performance and service levels. The
connections provide connection transactions across different components and
infrastructures.
Iteration 2 Planning
Plan
Planning
session shall take two weeks. During first half of first-week research shall meet
planning and design experts for assessing the requirements of the new
adoption. The activities involved shall
include comparing the most efficient and effective resources in industries who
take parts in implementing as well as successful execution of Splunk tools. The
tasks in the session shall include performing data and information collection
techniques to identify user specifications, needs, and requirement (L. K. Han,
personal communication, April 23, 2017). The session manager shall be MR. Han,
the Slunk tools planning and designing consultant. During the second half of
the first-week, researchers shall look into the issues to be addressed in the
adoption, process. The session shall involve preparation of the needed
resources as well as defining the environment as well as platforms that
implement the desired Splunk systems. Researchers shall be required to come up
with different solutions that can be adopted through evaluation of cost
analysis, viability as well as user requirements. The tasks during the study
shall include conducting feasibility studies and presenting the reports to
executive teams and investors (B. G. Ivy, personal communication, April 25,
2017). Facilitator of the session will be Mrs. Ivy, the pioneer in the project
proposal and project development.
The
first half of the second week shall involve having brain storming meeting
session with a purpose of evaluating, validating and assessing identified
solutions. Researchers shall be involved in selecting the most viable solution
that guarantees and offers the greatest benefits in securing networks, systems,
as well as company utilities (B. G. Ivy, personal communication, April 28,
2017). Finally, during the last session
of second-week participants shall engage in discussions meeting to define
scope, as well as providing the budget plan for the entire systems
implementation.
Action
I
took part in the meeting that involved preparation, planning and organizing the
implementation of Splunk oriented systems that ensure the security of data and
information assurance. During the meeting with Mr. Han and the designing
committee, we computed the design as well as of the Splunk systems in the
security domain. The designing process involved benchmarking from other
industries those implements Splunk tools (L. K. Han, personal communication,
May 02, 2017). In the study, session companies visited included Enterprise
Management Associates (EMA). The design implemented an involved implementation
of systems capable of indexing, searching and reporting capabilities. Design
interface contains links to LOB (Line of Business) systems for effective and
efficient solving of problems. I also took part in performing data and
information collection. According to analysis performed users such as business
stake holders, directors, and managers require Splunk systems to facilitate
recording of user transactions, identifying customer behaviors, collecting and
analyzing cyber security activities (L. K. Han, personal communication, May 03,
2017). Security analysts require systems that can enhance fast evaluation of
security threats fraud activities as well as facilitate online security
analysis.
Other
activities involved performing the feasibility study analysis through the
assistance of different experts. During the session, various factors considered
included evaluating the economic feasibility, functional feasibility,
operational feasibility and occupational feasibility. Through the assistance of
Mrs. Ivy, we computed the budget by allocating money values to the various
requirements. Among the utilities
required included hardware and software components, human resources, among
other miscellaneous commodities. Budget and requirement deliverables were
presented to a panel of investors through webinars, video conferencing and
presentations to cater for distance stakeholders, executives, and financiers.
Alternative systems included Performance Key Indicators (PKI) systems, DevOps
and Hadoop databases (B. G. Ivy, personal communication, May 06, 2017).
However, their significance in the study analysis was not as significant.
Alternative systems could not effectively solve issues involving security. I
also took activities such as making a decision on the scope of Splunk tools.
Scope covered most of the business applications such as searching and
investigating security monitoring and alerting, operational visibility of
activities and utilities, as well as real time business insight measures (B. G.
Ivy, personal communication, May 05, 2017). The resource planning operations involved
organizing order for delivering utilities to accomplish the plan. Resources
allocated involved human resources, development platforms, research and
innovations hubs as well as allocating various teams duties, responsibilities,
and tasks (F. J. Yvette, personal communication, May 07, 2017). The entire
collaboration was to implement a plunk infrastructure with the following
functionalities and features as shown in the figure below.
The Splunk architecture framework
Observation
Through
the session facilitated by Mr. Han, Mrs. Ivy, and Miss. Yvette, I have observed
that various planning operations are vital in the development of quality,
acceptable and user oriented systems. The entire operation involving planning
started with a simple design which was integrated into a complex system that
involved different functionalities in business operations (B. G. Ivy, personal
communication, May 09, 2017). Through the study, I observed that methods and
methodologies applied during data and information collection included
observation, questionnaire, interviews and demographic benchmarking. Industries
implementing Plunk technologies are highly benefiting from services such as
receiving data and information from different network ports that are capable of
running scripts (L. K. Han, personal communication, May 10, 2017). The
capability facilitates automated data and information forwarding. Among security measures and data and
information assurance measures enjoyed by various Companies include sending
alerts and threshold to individual’s servers. I observed that the Splunk tool
has the capability of incorporating failure recovery through analytical
operations.
The planning phase provided earlier
budget as well as the flow of development operation s in a systematic
procedure. According to the planning committee, the most critical resources
included enough finances, human resources as well as development platforms.
Information based on user specifications as well as the quality of systems
demanded by users is vital for developing acceptable and reliable systems (B.
G. Ivy, personal communication, May 11, 2017). The planning session provides
guarantee that the proposed system satisfy user requirements as well as
providing accurate expectations from user’s point of view. According to
interviews, the desired Splunk system should have the following features have a
platform which enables users to have machine readable data and information that
can be feed into machine data (F. J. Yvette, personal communication, May 11,
2017). Activities accomplished included creating accounts for various users to
facilitate complete participants as users. I have established levels of
administration, access privileges, as well as establishing rules based on
functionality principles. The various sessions have enhanced effective and
efficient allocation of duties within the system interior and exterior systems
(F. J. Yvette, personal communication, May 12, 2017). Through training, I was
capable of implementing database allocation privileges under strong
surveillance and monitoring from Mr. Miss Yvette.
Reflection
The
planning session went well. All planned activities were accomplished according
to expectations and focus of teams. Through the entire session, I have acquired
knowledge skills as well as detailed information required when planning and
implementing systems planning session. Through the plan, I have understood the
significance of prototype models that guide in the implementation of
appropriate systems. I have understood project management and development
operations that facilitate proper implementation and guidance in implementing
Splunk systems that transform business operations. The planning session has
facilitated effective and efficient accomplishing of Data and information
physical security that ensure organizations are dealing with physical security
such as earthquakes, volcanoes eruptions, flooding, among other catastrophic
disasters to guarantee continuity of business operations (L. K. Han, personal
communication, May 12, 2017). The planning dedicated Splunk as a tool to
implement Application Monitoring through the use of knowledge objects, which
can monitor other business applications especially in real-time (L. K. Han,
personal communication, May 12, 2017). The committee meeting during brain
storming session planned for systems that can support configuration of alerts
with a purpose of notifying systems administrators when the business
application crashes or when users are experiencing downtime.
Planning
session has accomplished a trend that involves network security by increasing
security in organization systems. The architecture is expected to accomplish
security through blacklisting certain IP from accessing network as well
blocking other network systems from gaining penetration (L. K. Han, personal
communication, May 13, 2017). The plan is focusing on implementing knowledge
based objects referred to as lookups. Another utility that shall be
incorporated in the Plunk security systems is the governing and management of
employee to ensure that all activities and functions of employees are monitored
(B. G. Ivy, personal communication, May 14, 2017). The bench marked systems
accomplished the plan through monitoring activities of users. Fraud activities
among employees shall be controlled through giving notices, warnings as well as
summoning them for the period. The systems shall also create a list of users
through implementing rules that prevent users from copying data and information
as well as assigning various members active and passive utility function (F. J.
Yvette, personal communication, May 15, 2017).
The training session has provided
effective and efficient methodologies that can enhance integration of other
security enhancing systems. Among incorporated systems include the use of
machine data also known as data exhaust. The major activity analyzed included
exhaustive implementation of techniques that analyze faster growing of segments
that incorporate big data concepts (P. C. Faith, personal communication, May 23,
2017). The various sections that I was trained to implement machine data
analyzing included tools for analyzing websites, applications, servers,
networks as well as mobile devices. I was trained in installing tools that
ensure exchange of information between various devices and technologies such
consolidation analysis systems.
Iteration 3 Implementation
Plan
The
implementation research session shall take two weeks. During the implementation
process, the research will involve the adoption of the different IT solutions
for effective accomplishment of the desired system using the designed
architecture. The first half of the first week shall involve a team of
developers with researchers shall developing the plank systems that benefits
for the players in the information assurance industry. The implementation
process shall link all stake holders through facilitating complete assessment
of in resolving issues and challenges established by the stakeholders and users
during problems assessment and problem definition process (K. D. Mayor,
personal communication, May 17, 2017). The facilitator of the session shall be
Mr. Mayor, the background development officer.
Other
sessions shall concentrate mainly on development and accomplishment of the
Plunk architecture. The second half of the week shall develop and design the
forwarder with the capability of intelligently routing data and information
across other network platforms. Developers shall ensure security measures such
as cloning of data and information is guaranteed (P. C. Faith, personal
communication, May 18, 2017). Researchers shall be involved in activities such
as load balancing to have enough experience in determining systems performance
and speed. The facilitator of the session shall be Mrs. Elias the programming
engineer during the first half of second-week activities performed shall
include developing the user interface for the servers systems. The operations
shall involve deployment of server modern server technologies for the effective
management of the entire business operations. Both client and server
configurations and settings shall be provided to ensure that the entire systems
adhere to calling of instances of various applications (W. R. Elias, personal
communication, May 19, 2017).
The
first half of second-week users shall enforce activities such as creating views
access controls as well as accounts management modules. Other activities
involved shall include integration of searching components as well as
analytical systems for analyzing reports and creating summaries. Other systems
that shall include integrating Visualization dashboards. Miss shall monitor the
session. Faith knowledge based systems developer. Final activities shall
involve creating Splunk web interfaces.
The session shall involve incorporating user interface graphics as well
as other graphical user interfaces. The session shall also include testing of
systems for quality as well as efficiency. A panel of experts shall access the
testing operations for validating and verifying developed system. Researchers
shall be introduced to quality assurance principles and methods that guarantee
that developed systems adhere to quality and international standards of quality
(P. C. Faith, personal communication, May 20, 2017).
Activity
I
took part in the implementation process. Activities involved included creating
the user interfaces that facilitate the transformation of data and information
through security measures. Through the assistance of interface developers, I
was capable of integrating major applications such as business platforms,
organization profiles among other applications. Through implementation, I was
able to perform cloning as a method of creating multiple interfaces of
events. Through creating of databases, I
was able to visualize the significance of creating data source where as load
balancing and sensitive data and information is evaluated. Other operations
performed involved creating of instances. Security parameters should guarantee
that even if one instance fails, another instance should ensure that no
communication failure occurs (W. R. Elias, personal communication, May 22,
2017). Instances created guaranteed that data and information are transmitted
without encountering problems. I also took part in integrating systems such as
analytical tools. Development process
involved incorporating systems such as financial records, manufacturing as well
as logistic data and information. The systems involved inserting tools capable of
performing monthly reporting as well as facilitating business management
operations (P. C. Faith, personal communication, May 23, 2017).
Through
the intervention of Mr. mayor, we were capable of attaching map reduce software
framework to support functionalities such as distributed computing on large
data and information sets such as clusters of computers. An implemented system
facilitates easier searching of data and information. An integrated system
includes knowledge based systems that facilitate tagging of data and
information (K. D. Mayor, personal communication, May 24, 2017). Through
implementation process, I was capable of creating event types such as creating
search constraints, views, and systems servers operands. Major functions
applied to the plunk systems included functions for data input functions, data
storage functions as well as data searching functionalities. The three main
components that Miss. Faith helped in incorporating included Splunk forwarder
designed for forwarding data and information. Another utility included Splunk indexer
for parsing and indexing data and information. It also included search head
containing user graphic interfaces for searching, analyzing, as well as
reporting across the platforms (K. D. Mayor, personal communication, May 25,
2017).
Observations
I
observed that Splunk Server should implement various methods and methodologies.
Programming technologies applied in implementing plunk systems included web
application servers, Python, Ajax, CSS, XSLT, and XML. I observed that risk
analysis systems were implemented through designing correlation search triggers
for enhancing risk analysis as well as performing response analysis. Developed
Splunk systems allow the provision of granular role based security modeling (K.
D. Mayor, personal communication, May 27, 2017). The systems facilitate
authentication of user activities. It facilitates effective implementation of
web user interfaces, command line interfaces, as well business application
interfaces through the use of Slunk Application Programming Interface (API) (W.
R. Elias, personal communication, May 27, 2017). Through security analytical
tools integrated the systems facilitates implementation of activities such as
troubleshooting, investigating security incidences, sending security alerts as
well as ensuring that data and information have fully been secured. Splunk
systems ensure full compliance of systems through sensitive production security
analysis reports (P. C. Faith, personal communication, May 28, 2017). Slunk
architecture supports security analysis through taking a proactive stance for
investigating and responding to sensitive issues. It facilitates monitoring and
triaging verifying and escalating of data and information through responding to
the breaching of security parameters or malware infection.
The
Slunk tool supports data and information assurance through collecting indexes
log as well as machine data from any source. It has utilities for performing
powerful security search, analyzing intelligence learning as well as
visualization capabilities that empower users. I observed that through testing
and evaluation processes (W. R. Elias, personal communication, May 29, 2017),
implemented systems are capable of mitigating fraud and cyber threat through
detecting areas with security vulnerabilities. The performance testing
operations revealed that Splunk guarantees quality performance through
facilitating real time analysis through guaranteeing operational intelligence
as well as business reporting (P. C. Faith, personal communication, May 29,
2017).
Reflection
The
session has facilitated effective and efficient implementation of Splunk
systems. The systems are capable of ensuring data and information security
assurance through enforcing confidentiality, integrity, and availability (K. D.
Mayor, personal communication, May 01, 2017). Entire operations involving
business activities can be secured using automated systems that ensure Splunk
tool within the Splunk tool are completely achieved using cloud computing and
analytical tools. The accomplished systems promote the effective and efficient
application of incident response, disaster recovery, and business continuity
through giving alerts on security data. Current systems guarantee effective and
efficient collecting, aggregating, de-duplicating, and prioritizing of threats
using intelligence systems that derive learning from multiple sources (K. D.
Mayor, personal communication, May 01, 2017). The developed system can ensure
complete streamlining of security operations through conducting rapid investigations
through applying ad-hoc searches. The systems were fully verified and validated
as worth for detecting and reducing internal and external cyber threats,
attacks, intrusion as well as malware. New technologies such as security
analysis systems enhance increased implementation of capabilities that promote
detection of threats and optimization of activities that optimize incident
responses.
The
incorporation of Hadoop database systems promotes effective and efficient
accomplishing of big data and information support through reducing internet
traffic as well as machine data and information analyzing. The analytical tools
are designed to support all types of data and information by analyzing machine
data from systems that have varying formats. Among strategies and practices
implemented to enforce security include 2-factor authentication, use of public
key authentication such as the use of TLS client certificate (P. C. Faith,
personal communication, May 02, 2017). The security measures also implement
facilities such as dedicated link that accomplishes security parameters using
virtual private networks (VPN). Other direct security utilities include the use
of username and password (W. R. Elias, personal communication, June 03, 2017).
Iteration 4 Monitoring and Evaluation
Plan
Operations
involving phase in action research encompasses the monitoring and evaluation of
the implemented solution to ensure that they are resolving the issues
identified according to professional and as effective as possible. The session
involves maintaining and training the systems operators to ensure that the
entire network and organization systems are secure. First week practices
involve data and information assurance awareness, training, and education
program. The session shall equip researchers with roles, responsibilities,
duties, and functionalities that an expert in the field of IT should have (Z.
C. Bred, personal communication, June 07, 2017). Researchers shall be equipped
with knowledge involving responsibilities of system administrators, database
administrators, network Administrators, security administrators, web
administrators, and help desk administration. The awareness session shall be
monitored by Mr. Bred, the security awareness officer.
Other
activities shall include performing hardware and software upgrading. The
session shall include installing and integrating hardware components on the
security systems. Researchers shall also be required to perform software
patching and vulnerability monitoring. Researchers shall be required to
understand tasks such as consistent mitigation of organizational
vulnerabilities (F. G. Sarah, personal communication, June 08, 2017). The
operation shall be achieved through a testing and integrating patching
procedures. According to principles implemented
in maintenance process mature patching and vulnerability management techniques
should be implemented to allow organization by maintaining the appropriate
levels of security for most of the existing organizations (F. G. Sarah,
personal communication, June 08, 2017). The facilitator during the upgrading
and patching operations shall be Miss Sarah, software and hardware maintenance
engineer.
Finally,
another area applied in monitoring and evaluation criteria shall include being
ready to assess services that assist organizations in determining effective and
efficient entities that should be protected. Researchers shall evaluate
entities such as people, operations, and technologies. The aim of the
assessment is to meet specific security objectives that support of
organizational objectives. Researchers shall implement the following assessment
methods to accomplish analysis criteria technical vulnerability assessments,
non-technical vulnerability assessments, as well as penetration testing (Z. C.
Bred, personal communication, June 08, 2017).
Action
During
the security awareness operations, I took part in awareness training session.
The security roles and activities discussed were provided in a life-cycle
approach. The session on the creation of
security awareness involved the introduction of organization designing,
developing, implementing, as well as maintaining information assurance
awareness based on specific needs and requirements. The maintenance training
procedures included expanding the size and geographical dispersion of the
organization. The entire duties include defining organizational roles and
responsibilities through allocating appropriate budget as well as authority.
Other activities in the session shall involve the implementation of services
that combined hardware upgrading and patch automation. The session activities
included installing new hard drives, huge memories, and improved processors to
facilitate fast performance of systems. The session incorporated activities
such as troubleshooting, repairing, and diagnosing. Activities implemented in
the session involved performing preventative and maintenance operations to
ensure that all organizations have the potential of spending less time, fewer
resources, as well as less money on incident responses. Patching and upgrading
operations management services guided us in preventing the exploitation of
Information Technology vulnerabilities through improving systems performance
within an organization.
Among
the monitoring and evaluation operations performed included creating a patching
and vulnerability analyzing systems that facilitate continuous monitoring of
vulnerabilities, remediation, and threats. Other activities practiced included
prioritizing patch application where phases are deployed as most appropriate
(F. G. Sarah, personal communication, June 08, 2017). Evaluation process
involved testing patches before deployment. Other operations included deploying
enterprise-wide automated patching solutions through automating, and updating
applications as needed. Through interacting with experts, we were able to
analyze the results as well as translating technical and non-technical data and
information. Results led to the computation of technical and non-technical
mitigation recommendations which were presented in a comprehensive, detailed,
and easy to read the report (Z. C. Bred, personal communication, June 12,
2017).
The
network implementation included ensuring that every setting and related
operations are effectively and efficiently coordinated through providing
security within network systems. All connections implemented in the systems
were fully integrated with Splunk tools mainly for observing, monitoring and
surveying various concepts within the network. Through the assistance of Bred,
I was capable of configuring networks with modern systems and incorporating
alert systems in the network systems. Achievements made during the session
included accomplishing all operations related to security systems especially
areas concerned with multiple accounts.
Observation
Through
session for monitoring and evaluation, I have acquired and developed methods
and standards that apply to the creation of reliable data and information
inventory of all information technology assets. I have observed that various
standards that apply in maintaining information assurance. The architecture
applied in study analysis includes standardization of configurations to ensure
security measures information technology resources as much as possible. Through
the activities analyzed included understanding and verifying that
vulnerabilities have been remediated. The Splunk tools ensure that the
consistent methods and methodologies applied while developing Splunk tools can
consistently measure the effectiveness of the organization. The patching
methodologies ensure that the vulnerability management and control can
continuously be applied through corrective actions as necessary. The session
involving training and application of staff on vulnerability monitoring and
remediation techniques involves Periodical testing of the effectiveness of the
organizational patching and vulnerability controlling of the effective and
efficient operation of programming technologies. I have observed that the
vulnerability mitigation techniques resources include conducting vulnerability
testing, network testing, and web testing.
I
observed that duties and responsibilities involving the strengthening of
monitoring, inspection as well as evaluation procedures. Monitoring activities
involve inspection as well as evaluation of procedures recommended through
determining data analysis procedures and applying quantitative and qualitative
analysis tools. An evaluation procedure involves cleaning, sorting,
categorizing and organizing data. The organization of information involves
developing monthly, quarterly, or annual reports. The techniques that are
applied in monitoring and evaluating supervision of regular data and
information through collecting and implementation of partners that ensure the
quality of the data of verifying and validations of flow of data and
information. I observed that various
techniques applied include investigating systems, protocols, networks traffic
as well as historical time frames for security needs and requirements.
I
have observed that the digital publishing technologies are highly significance
especially in improving digital assets infrastructure. I have observed various
techniques that facilitate monitoring and troubleshooting networks for an
effective end to end asset delivering. Splunk tool is best applied in the
implementation on measuring the popularity of companies, through evaluation
views, social media links, and other reconciliation techniques
Reflections
Through evaluation and monitoring, I
have effectively acquired knowledge and information required for ensuring that
entire analysis of resources for implementing information assurance techniques.
Splunk systems guarantee effective offering of a premium solution for
information security. It improves enterprise Security through Splunk ES that
has the capability of supporting the advanced application of ready-to-use
dashboards. The systems provide risk control and management operations. The
plunk systems ensure complete implementation of governance, security operations
as well as compliance operations. The technology has implemented various
operations such as integrating the ability to use, creating and editing
existing problems. The completed systems are complete provisions of needed
flexibility for enhancing effective and efficient security assurance. The
systems have accomplished support of common Information Technology (IT). Assurance techniques involve implementation
of compliance techniques, controlling and managing fraud, mitigating theft of
data and information as well as preventing abuse of users through detecting
attacks, malware espionage as well as preventing every form of, IT operations,
service intelligence, application delivery and business analytics.
Security
implementation of security teams prevention of work effectively through
facilitating IT functionalities. The effective security-related applications
ensure that Splunk database is completely secured from effect through pre
building searches, reporting and visualizing of specific third party operations
involving security vendors. The systems provide ready-to-use applications that
utilize an additional provision of capabilities that range from monitoring
security. Other utilities applied include the use of modern technology
generation firewalls, as well as advanced treatment and control of management
as well as the effective acquisition of security systems. The future
implementation of Splunk systems shall ensure complete implementation of
security coverage through providing the Splunk tools in business operations (F.
J. Yvette, personal communication, June 30, 2017). The research operation will ensure that all
network systems as well as utilities, systems, and network utilities.
Summary of learning
Through
research, I have acquired knowledge for allocating resources and developing
mile stones for the entire project. The session has ensured that each step of
the solution is matched with the appropriate resources as well as the best
experts. Team leaders and modular programming methodologies have enabled me to
establish mechanisms that ensure the execution of the solution and success.
Supervisor of the session shall Miss. Yvette, the resource and project
organization manager.The major goal learned in the study includes extracting
useful data and information elements that can be used in comparing and
identifying information assurance trends, root causes of analysis as well as
security shortfalls. The complete
analysis the assessments, and the finding were compiled in a single report. I
have observed that current systems, as well as modern business operations, have
the potential of guaranteeing security analysis as well as monitoring cases
involving fraud attacks through ensuring compliance issues. Through the study,
I have understood that the scope of the Splunk systems covers areas such as
monitoring logistics and supply chains using Radio Frequency Identification
(RFID) and databases machine data. It also spans across the internet of things
through controlling and managing SCADA data and information.
I
have learned the entire system users should have the ability to generate
information automatically from connected hardware devices, shared utilities on
networks, database managers should access and link to servers, as well as have
the ability to manage control and allocate Internet of Things (IoT) devices and
other sources to users. Users of the system can achieve security measures
through effective planning of goals, and an objective of the entire Splunk is
used for analyzing machine data and information. Through entire session I have
understood the goal of information assurance through providing effective and
efficient insights into business application management, business operations
control, managing IT operations, guaranteeing strong security and enforcing security
compliance through fraud detection, threat mitigation and provision of methods
of viewing threats.
The current research study focus at
implementing Plunk tools in over 60 % of IT systems guarantying data scientists
through facilitating the improvement of data advanced analytics. The Splunk
tools ensure direct Information Technology analysis that guarantees stretched
approaches in over leveraging packaging of machine learning. The machine
learning procedures guarantee quick identifying of quick sources of IT
intelligence. The main security expert has total catching effects on solving
major insider threats. Splunk tools will ensure that user behaviors analysis
procedures are implemented in developing expertise security events in
monitoring and analyzing operations. Future study research analysis shall
involve determining the concept and utilization of big data concepts. The
research shall focus on implementing machine learning as a system that
completes a radical transformation of daily lives and ensuring that entire
business analytical tools respond to business operations in real time.
The significance of Plunk tools
shall include bringing data analysis in real time operations through allowing
business individuals perform future predictions. The tools shall be applied in
monitoring trends, patterns and behaviors of customers. The major benefits
within business operation shall include helping stakeholders in detecting risky
incidents in business, reducing decision making and time taken to get a
resolution to problems. The main objective is to predict, prevent as well as
avoid undesirable outcomes.
References
Altrichter, H., Kemmis, S., McTaggart, R., &
Zuber-Skerritt, O. (2002). The concept of action research. The learning
organization, 9(3), 125-131.
Bryman, A. & Bell, E. (2011) Business Research
Methods 3rd edition, Oxford University Press
Cisco.com (2015). Security Analytics on Cisco UCS
with Splunk: Improve Threat Detection and Accelerate response
Collis, J. & Hussey, R. (2003) Business
Research. A Practical Guide for Undergraduate and Graduate Students 2nd
edition, Palgrave Macmillan
Global Innovation Technology (2014). Network
Security monitoring.
Lisa S., (2012). The Ultimate Network Monitoring
Software. A Splunk primer.
Church, A. H., Rotolo, C. T., Margulies, A., Del
Giudice, M. J., Ginther, N. M., Levine, R., ... & Tuller, M. D. (2015). The
role of personality in organization development: A multi-level framework for
applying personality to individual, team, and organizational change. In Research
in organizational change and development (pp. 91-166). Emerald Group
Publishing Limited.
Gupta, S. K., Yadav, N., Watts, M. S.,
Parandehgheibi, A., Gandham, S., Kulshreshtha, A., & Deen, K. (2016). Policy-driven compliance U.S.
Patent Application No. 15/133,155.
Kim, J. H., Ma, M. C., & Park, J. P. (2016). An
analysis on secure coding using symbolic execution engine. Journal of
Computer Virology and Hacking Techniques, 12(3), 177-184.
Prabhakar, S., Pankanti, S., & Jain, A. K.
(2003). Biometric recognition: Security and privacy concerns. IEEE
security & privacy, 99(2), 33-42.
Reybok, R., Haugsnes, A. S., Kurt, J. Z. I., Rhines,
J., Geddes, H., Osypov, V., ... & Manning, M. (2015). Techniques for
sharing network security event information U.S. Patent
Application No. 14/615,202.
Splunk for IT Operations (2016). Splunk for IT
Operations. Get End-to-end Visibility Across the IT Infrastructure to Find and
Fix Problems Faster.
Splunk Inc, (2016) Splunk® And The Cis Critical Security
Controls. Mapping Splunk Software to the CIS 20 CSC Version 6.0.
Wilde, M., Hategan, M., Wozniak, J. M., Clifford,
B., Katz, D. S., & Foster, I. (2011). Swift: A language for distributed
parallel scripting. Parallel Computing, 37(9), 633-652.
Comments
Post a Comment