{"id":3587,"date":"2021-07-01T00:00:56","date_gmt":"2021-06-30T22:00:56","guid":{"rendered":"https:\/\/cyberawareness.sk\/?p=3587"},"modified":"2024-11-16T00:03:28","modified_gmt":"2024-11-15T23:03:28","slug":"manazment-bezpecnostnych-informacii-a-udalosti-pre-akademicky-informacny-system-3","status":"publish","type":"post","link":"https:\/\/cyberawareness.sk\/en\/2021\/07\/01\/manazment-bezpecnostnych-informacii-a-udalosti-pre-akademicky-informacny-system-3\/","title":{"rendered":"Mana\u017ement bezpe\u010dnostn\u00fdch inform\u00e1ci\u00ed a udalost\u00ed pre akademick\u00fd informa\u010dn\u00fd syst\u00e9m"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"3587\" class=\"elementor elementor-3587\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa18013 e-flex e-con-boxed e-con e-parent\" data-id=\"fa18013\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6e108e7 e-flex e-con-boxed e-con e-child\" data-id=\"6e108e7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-749fbad elementor-widget elementor-widget-ucaddon_square_icon_box\" data-id=\"749fbad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ucaddon_square_icon_box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<!-- start Icon Box -->\n\t\t<link id='font-awesome-css' href='https:\/\/cyberawareness.sk\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-all.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='font-awesome-4-shim-css' href='https:\/\/cyberawareness.sk\/wp-content\/plugins\/unlimited-elements-for-elementor\/assets_libraries\/font-awesome6\/fontawesome-v4-shims.min.css' type='text\/css' rel='stylesheet' >\n\t\t<link id='uc_ac_assets_file_blox_boxed_small_square_icon_box_css_0-css' href='https:\/\/cyberawareness.sk\/wp-content\/uploads\/ac_assets\/blox-boxed-small-square-icon-box\/blox-boxed-small-square-icon-box.css' type='text\/css' rel='stylesheet' >\n\n<style>\/* widget: Icon Box *\/\n\n#uc_square_icon_box_elementor_749fbad * { \n\tbox-sizing: border-box; \n}\n\n#uc_square_icon_box_elementor_749fbad{\n\tfont-family: inherit;\n    transition:0.3s;\n    position:relative;\n}\n\n#uc_square_icon_box_elementor_749fbad .blox-boxed-small-square-icon-box-icon{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(0deg);\n    z-index:2;\n}\n#uc_square_icon_box_elementor_749fbad .ue-icon {\n  display:inline-block;\n}\n#uc_square_icon_box_elementor_749fbad .blox-boxed-small-square-icon-box-icon > div{\n\t\n\tposition:relative;\n    display:flex;\n    justify-content:center;\n    align-items:center;\n    transform:rotate(-0deg);\n}\n#uc_square_icon_box_elementor_749fbad .ue-icon-inner{\n    line-height:1em;\n\t} \t\n\n\n#uc_square_icon_box_elementor_749fbad .ue-icon-inner svg{\n    height:1em;\n    width:1em;\n\t} \t\n\t\n.blox-boxed-small-square-icon-box-heading{\n\tfont-size:21px;\n\t}\n\n\n#uc_square_icon_box_elementor_749fbad:hover\n{\n  position:relative;\n  z-index:1;\n}\n\n\n#uc_square_icon_box_elementor_749fbad .ue_box_button\n{\n  text-align:center;\n  text-decoration:none;\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n#uc_square_icon_box_elementor_749fbad span.line\n{\n  display:block;\n  position:absolute;\n  top:0;\n  left:0;\n  width:0px;\n  transition:0.3s;\n}\n\n#uc_square_icon_box_elementor_749fbad:hover span.line\n{\n  width:100%;\n}\n\n#uc_square_icon_box_elementor_749fbad .ue-title-separator span\n{\n  display:inline-block;\n  transition:0.3s;\n}\n\n\n\n\n\n<\/style>\n\n<div class=\"square_icon_box\" id=\"uc_square_icon_box_elementor_749fbad\">\n  \n  \t\t  \n  \n              <div class=\"ue-icon\">\n       <a style=\"display:inline-block; text-decoration:none;\" href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2024\/11\/09BCAD0356744FDB804AE6F37B7FB92D.pdf\" >         <div class=\"blox-boxed-small-square-icon-box-icon\" style=\"background-color: ;\">\n           <div class=\"ue-icon-inner\"><i class='fas fa-book'><\/i><\/div>\n         <\/div>\n       <\/a>       <\/div>\n         \n  \t\t        <div class=\"blox-boxed-small-square-icon-box-heading\">\n        \tPr\u00e1ca\n        <\/div>\n          \n  \t\t  \n  \n          \n  \t\t        \n          \n  \t\t  \n<\/div>\n<!-- end Icon Box -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e851db elementor-widget elementor-widget-text-editor\" data-id=\"8e851db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Autor: <\/strong>Bc. Eva Markov\u00e1<br \/><strong>\u0160kolite\u013e: <\/strong>RNDr. JUDr. Pavol Sokol, PhD.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5a0a23 elementor-widget elementor-widget-heading\" data-id=\"e5a0a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Abstrakt<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b77c4c2 elementor-widget elementor-widget-text-editor\" data-id=\"b77c4c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>V pr\u00e1ci sa zaober\u00e1me h\u013eadan\u00edm vhodn\u00e9ho rie\u0161enia mana\u017ementu bezpe\u010dnostn\u00fdch inform\u00e1ci\u00ed a udalost\u00ed pre akademick\u00fd informa\u010dn\u00fd syst\u00e9m (SIEM). SIEM syst\u00e9m je schopn\u00fd detegova\u0165 bezpe\u010dnostn\u00e9 \u00fatoky, pri\u010dom vyhodnocuje bezpe\u010dnostn\u00e9 udalosti a inform\u00e1cie. Hlavn\u00fdm cie\u013eom tejto pr\u00e1ce je navrhn\u00fa\u0165 tak\u00fdto syst\u00e9m, aby sme boli schopn\u00ed v\u010das rie\u0161i\u0165 samotn\u00e9 dopady na organiz\u00e1ciu, pr\u00edpadne \u00faplne zabr\u00e1ni\u0165 \u00fatokom. Vzh\u013eadom k tomu, \u017ee akademick\u00fd informa\u010dn\u00fd syst\u00e9m generuje mnoho r\u00f4znych z\u00e1znamov, bolo nutn\u00e9 tieto z\u00e1znamy spracova\u0165 a prisp\u00f4sobi\u0165. Pre \u00fa\u010dely vytvorenia SIEM syst\u00e9mu sme sa rozhodli vyu\u017ei\u0165 rie\u0161enie s otvoren\u00fdm zdrojov\u00fdm k\u00f3dom ELK (Elasticsearch, Logstash, Kibana). Nad t\u00fdmto rie\u0161en\u00edm je postaven\u00fd SIEM syst\u00e9m. Pri implement\u00e1cii syst\u00e9mu zoh\u013ead\u0148ujeme MITRE ATT&amp;CK r\u00e1mec. Vybran\u00e9 hrozby, relevantn\u00e9 pre akademick\u00fd informa\u010dn\u00fd syst\u00e9m, sme odsimulovali na testovacom serveri, aby sme n\u00e1sledne boli schopn\u00ed vytvori\u0165 pravidl\u00e1 pre detekciu \u00fatokov na akademickom informa\u010dnom syst\u00e9me, a aby sme tak predi\u0161li pr\u00edpadn\u00fdm ne\u017eelan\u00fdm dopadom (\u00fanik a podobne) pre akademick\u00fa in\u0161tit\u00faciu. \u00datoky, ktor\u00e9 je mo\u017en\u00e9 o\u010dak\u00e1va\u0165 v r\u00e1mci akademick\u00e9ho informa\u010dn\u00e9ho syst\u00e9mu m\u00f4\u017eeme rozdeli\u0165 do troch kateg\u00f3ri\u00ed \u2013 \u00fatoky na \u00farovni opera\u010dn\u00e9ho syst\u00e9mu, na \u00farovni webovej aplik\u00e1cie a na \u00farovni prihl\u00e1sen\u00e9ho pou\u017e\u00edvate\u013ea. Poslednou \u010das\u0165ou tejto diplomovej pr\u00e1ce je vyhodnotenie syst\u00e9mu, kde berieme do \u00favahy z\u00e1va\u017enos\u0165 v\u00fdskytu bezpe\u010dnostn\u00fdch hrozieb v r\u00e1mci akademick\u00e9ho informa\u010dn\u00e9ho syst\u00e9mu.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e39a89a elementor-widget elementor-widget-heading\" data-id=\"e39a89a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ciele<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05fb267 elementor-widget elementor-widget-text-editor\" data-id=\"05fb267\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Anal\u00fdza aktu\u00e1lnych pr\u00edstupov k mana\u017ementu bezpe\u010dnostn\u00fdch inform\u00e1ci\u00ed a udalost\u00ed (SIEM) s oh\u013eadom na akademick\u00e9 informa\u010dn\u00e9 syst\u00e9my.<\/li><li>N\u00e1vrh pravidiel detekcie bezpe\u010dnostn\u00fdch hrozieb pre akademick\u00fd informa\u010dn\u00fd syst\u00e9m zoh\u013ead\u0148uj\u00fac MITRE ATT&amp;CK r\u00e1mec.<\/li><li>N\u00e1vrh, implement\u00e1cia a vyhodnotenie SIEM syst\u00e9mu pre akademick\u00fd informa\u010dn\u00fd syst\u00e9m.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89aa96b elementor-widget elementor-widget-heading\" data-id=\"89aa96b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Literat\u00fara<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d149794 elementor-widget elementor-widget-text-editor\" data-id=\"d149794\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>MURDOCH, D. W. SOC, SIEM, and Threat Hunting (V1.02): A Condensed Guide for the Security Operations Team and Threat Hunter. Independent Publishing, 2019.<\/li><li>COLLINS, Michael. Network Security Through Data Analysis: From Data to Action. O&#8217;Reilly Media, Inc., 2017.<\/li><li>STROM, Blake E., et al. Finding cyber threats with ATT&amp;CK-based analytics. Technical Report MTR170202, MITRE, 2017.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a432df6 elementor-widget elementor-widget-heading\" data-id=\"a432df6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Priebeh pr\u00e1ce<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f13991a elementor-widget elementor-widget-text-editor\" data-id=\"f13991a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>V\u00fdber vhodnej implement\u00e1cie SIEM syst\u00e9mu \ud83d\uddf8<\/li><li>Porozumenie MITRE ATT&amp;CK r\u00e1mca \ud83d\uddf8<\/li><li>Anal\u00fdza riz\u00edk pre AiS2 \ud83d\uddf8<\/li><li>N\u00e1vrh pravidiel detekcie bezpe\u010dnostn\u00fdch hrozieb \ud83d\uddf8<\/li><li>Implement\u00e1cia SIEM syst\u00e9mu \ud83d\uddf8<\/li><li>Nasadenie SIEM syst\u00e9mu na testovac\u00ed server AiS2 \ud83d\uddf8<\/li><li>Simul\u00e1cia \u00fatokov na testovac\u00ed server \ud83d\uddf8<\/li><li>Otestovanie SIEM syst\u00e9mu na produk\u010dnom serveri<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40e2221 elementor-widget elementor-widget-heading\" data-id=\"40e2221\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Dokumenty k pr\u00e1ci<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1de52ca elementor-widget elementor-widget-text-editor\" data-id=\"1de52ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>PDSI: roz\u0161\u00edren\u00e9 zadanie, prezent\u00e1cia<\/li><li>SDIa: \u010dl\u00e1nok, prezent\u00e1cia<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Autor: Mgr. Eva Markov\u00e1<br \/>\n\u0160kolite\u013e: RNDr. JUDr. Pavol Sokol, PhD.<\/p>","protected":false},"author":9,"featured_media":2397,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"full-width","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[],"footnotes":""},"categories":[11],"tags":[],"class_list":["post-3587","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-diplomove-prace","entry","has-media"],"_links":{"self":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/3587","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/comments?post=3587"}],"version-history":[{"count":13,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/3587\/revisions"}],"predecessor-version":[{"id":3649,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/posts\/3587\/revisions\/3649"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media\/2397"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media?parent=3587"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/categories?post=3587"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/tags?post=3587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}