Cargando…

Proactive early threat detection and securing SQL database with IBM QRadar and IBM Spectrum Copy data management, using IBM FlashSystem safeguarded copy /

This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM QRadar®. It also highlights how to proactively start a cyber resilience workflow in response to a cyberattack or potential malicious user actions. The workflow that is presented here uses IBM...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Sapkar, Tejas (Autor), Shingornikar, Shashank (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : IBM Blueprint, 2022.
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007i 4500
001 OR_on1348103436
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 221018s2022 xx a o 000 0 eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCF  |d OCLCO 
020 |a 9780738460857  |q (electronic bk.) 
020 |a 0738460850  |q (electronic bk.) 
029 1 |a AU@  |b 000072848717 
035 |a (OCoLC)1348103436 
037 |a 9780738460857  |b O'Reilly Media 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23/eng/20221018 
049 |a UAMI 
100 1 |a Sapkar, Tejas,  |e author. 
245 1 0 |a Proactive early threat detection and securing SQL database with IBM QRadar and IBM Spectrum Copy data management, using IBM FlashSystem safeguarded copy /  |c Tejas Sapkar, Shashank Shingornikar. 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b IBM Blueprint,  |c 2022. 
300 |a 1 online resource (34 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM QRadar®. It also highlights how to proactively start a cyber resilience workflow in response to a cyberattack or potential malicious user actions. The workflow that is presented here uses IBM Spectrum® Copy Data Management as orchestration software to start IBM FlashSystem® Safeguarded Copy functions. The Safeguarded Copy creates an immutable copy of the data in an air-gapped form on the same IBM FlashSystem for isolation and eventual quick recovery. This document describes how to enable and forward SQL database user activities to IBM QRadar. This document also describes how to create various rules to determine a threat, and configure and start a suitable response to the detected threat in IBM QRadar. Finally, this document outlines the steps that are involved to create a Scheduled Job by using IBM Spectrum® Copy Data Management with various actions. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Cyber intelligence (Computer security) 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Internet  |x Security measures. 
650 6 |a Surveillance des menaces informatiques. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Internet  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Cyber intelligence (Computer security)  |2 fast 
650 7 |a Internet  |x Security measures  |2 fast 
700 1 |a Shingornikar, Shashank,  |e author. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780738460857/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP