SIEM DESIGN: CYBER KILL CHAINS, MITRE ATTACK AND SIEM

You may be wondering what on earth a Cyber Kill Chain is? After all, it sounds very a military term with little application in a business sphere, well I will connect the dots for you.
SECURITY INFORMATION & EVENT MANAGEMENT DESIGN

Enhanced logging is taking detailed information about events happening on a system to determine if there are any suspicious events occurring such as Word downloading a file from the internet…