IMPLEMENTASI SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) DALAM MENINGKATKAN KEAMANAN JARINGAN

Authors

  • Muh. Al Amin Institut Teknologi Bacharuddin Jususf Habibie Author
  • Rakhmadi Rahman Institut Teknologi Bacharuddin Jusuf Habibie Author

DOI:

https://doi.org/10.69714/ee1r1q05

Keywords:

SIEM, Information Security, Implementation, Threat Detection, Regulatory Compliance

Abstract

In the rapidly evolving digital era, threats to information security have become increasingly complex and diverse. Security Information and Event Management (SIEM) offers a comprehensive solution through the collection, correlation, and analysis of log data from various sources to detect and respond to threats in real-time. This research analyzes the implementation of SIEM in a large organization, highlighting its functionalities, benefits, and challenges, and conducts simulations to test its effectiveness. The results indicate that SIEM can enhance threat detection and response, ensure regulatory compliance, and improve operational efficiency. However, SIEM implementation requires careful planning, competent human resources, and strong management support.

References

Allen, J. (2020). Security Information and Event Management (SIEM) Implementation Guide. Wiley.

Brown, K. & Smith, A. (2019). "Real-Time Threat Detection with SIEM". Journal of Cyber Security, 15(2), 102-115

Cains, M. G., Flora, L., Taber, D., King, Z., & Henshel, D. S). Defining cyber security and cyber security risk within a multidisciplinary context using expert elicitation. Risk Analysis, 42(8), 1643-1669, 2022

Chuvakin, A., Schmidt, K., & Phillips, C. (2013). Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management. Syngress.

Johnson, R., & White, P. (2020). "The Role of SIEM in Modern Cybersecurity Strategies". Cybersecurity Today, 12(4), 234-245.

Kamal and Setiawan. Deteksi Anomali dengan Security Information and Event Management (SIEM) Splunk pada Jaringan UII. Jurnal Informatika Universitas Islam Indonesia Vol. 2 No. 2, 2021Martin, L. (2021). Advanced Threat Detection with SIEM. O'Reilly Media.

NIST. (2018). "Guide to Computer Security Log Management". NIST Special Publication 800-92.

Purwanto, A, & Soewito, B. Optimization problem of computer network using ppdioo. ICIC Express Lett, scholar.archive.org,z,2021

SANS Institute. (2021). "SIEM Architecture and Best Practices".

Downloads

Published

2024-07-27

How to Cite

IMPLEMENTASI SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) DALAM MENINGKATKAN KEAMANAN JARINGAN. (2024). Jurnal Riset Teknik Komputer, 1(3), 01-05. https://doi.org/10.69714/ee1r1q05