Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy:
This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM Security Guardium® Data Protection and IBM QRadar®. It also highlights how to proactively start a cyber resilience workflow in response to a cyberattack or potential malicious user actions. T...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
[Poughkeepsie, New York]
IBM Redbooks
2022
|
Ausgabe: | [First edition]. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780738460710/?ar |
Zusammenfassung: | This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM Security Guardium® Data Protection and IBM QRadar®. It also highlights how to proactively start a cyber resilience workflow in response to a cyberattack or potential malicious user actions. The workflow that is presented here uses IBM Copy Services Manager as orchestration software to start IBM FlashSystem® Safeguarded Copy functions. The Safeguarded Copy creates an immutable copy of the data in an air-gapped form on the same IBM FlashSystem for isolation and eventual quick recovery. This document describes how to enable and forward Oracle database user activities (by using IBM Security Guardium Data Protection) and IBM FlashSystem audit logs by using IBM FlashSystem to IBM QRadar. This document also describes how to create various rules to determine a threat, and configure and launch a suitable response to the detected threat in IBM QRadar. The document also outlines the steps that are involved to create a Scheduled Task by using IBM Copy Services Manager with various actions. |
Beschreibung: | Includes bibliographical references and index |
Umfang: | 1 Online-Ressource (44 Seiten) illustrations |
ISBN: | 9780738460710 0738460710 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-081846924 | ||
003 | DE-627-1 | ||
005 | 20240228121742.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220906s2022 xx |||||o 00| ||eng c | ||
020 | |a 9780738460710 |c electronic bk. |9 978-0-7384-6071-0 | ||
020 | |a 0738460710 |c electronic bk. |9 0-7384-6071-0 | ||
035 | |a (DE-627-1)081846924 | ||
035 | |a (DE-599)KEP081846924 | ||
035 | |a (ORHE)9780738460710 | ||
035 | |a (DE-627-1)081846924 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20220802 | |
100 | 1 | |a Shingornikar, Shashank |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy |c Shashank Shingornikar, Raninder Ravi Bhandari |
250 | |a [First edition]. | ||
264 | 1 | |a [Poughkeepsie, New York] |b IBM Redbooks |c 2022 | |
300 | |a 1 Online-Ressource (44 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM Security Guardium® Data Protection and IBM QRadar®. It also highlights how to proactively start a cyber resilience workflow in response to a cyberattack or potential malicious user actions. The workflow that is presented here uses IBM Copy Services Manager as orchestration software to start IBM FlashSystem® Safeguarded Copy functions. The Safeguarded Copy creates an immutable copy of the data in an air-gapped form on the same IBM FlashSystem for isolation and eventual quick recovery. This document describes how to enable and forward Oracle database user activities (by using IBM Security Guardium Data Protection) and IBM FlashSystem audit logs by using IBM FlashSystem to IBM QRadar. This document also describes how to create various rules to determine a threat, and configure and launch a suitable response to the detected threat in IBM QRadar. The document also outlines the steps that are involved to create a Scheduled Task by using IBM Copy Services Manager with various actions. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Information technology |x Security measures | |
650 | 0 | |a Computer security |x Management | |
650 | 0 | |a Data protection | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Technologie de l'information ; Sécurité ; Mesures | |
650 | 4 | |a Sécurité informatique ; Gestion | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security ; Management | |
650 | 4 | |a Data protection | |
650 | 4 | |a Information technology ; Security measures | |
700 | 1 | |a Bhandari, Raninder Ravi |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780738460710/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-081846924 |
---|---|
_version_ | 1821494819574251520 |
adam_text | |
any_adam_object | |
author | Shingornikar, Shashank Bhandari, Raninder Ravi |
author_facet | Shingornikar, Shashank Bhandari, Raninder Ravi |
author_role | aut aut |
author_sort | Shingornikar, Shashank |
author_variant | s s ss r r b rr rrb |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)081846924 (DE-599)KEP081846924 (ORHE)9780738460710 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03204cam a22005172 4500</leader><controlfield tag="001">ZDB-30-ORH-081846924</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121742.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220906s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738460710</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-7384-6071-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738460710</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-7384-6071-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)081846924</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP081846924</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780738460710</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)081846924</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20220802</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shingornikar, Shashank</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy</subfield><subfield code="c">Shashank Shingornikar, Raninder Ravi Bhandari</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Poughkeepsie, New York]</subfield><subfield code="b">IBM Redbooks</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (44 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM Security Guardium® Data Protection and IBM QRadar®. It also highlights how to proactively start a cyber resilience workflow in response to a cyberattack or potential malicious user actions. The workflow that is presented here uses IBM Copy Services Manager as orchestration software to start IBM FlashSystem® Safeguarded Copy functions. The Safeguarded Copy creates an immutable copy of the data in an air-gapped form on the same IBM FlashSystem for isolation and eventual quick recovery. This document describes how to enable and forward Oracle database user activities (by using IBM Security Guardium Data Protection) and IBM FlashSystem audit logs by using IBM FlashSystem to IBM QRadar. This document also describes how to create various rules to determine a threat, and configure and launch a suitable response to the detected threat in IBM QRadar. The document also outlines the steps that are involved to create a Scheduled Task by using IBM Copy Services Manager with various actions.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Technologie de l'information ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bhandari, Raninder Ravi</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780738460710/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-081846924 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:26Z |
institution | BVB |
isbn | 9780738460710 0738460710 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (44 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | IBM Redbooks |
record_format | marc |
spelling | Shingornikar, Shashank VerfasserIn aut Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy Shashank Shingornikar, Raninder Ravi Bhandari [First edition]. [Poughkeepsie, New York] IBM Redbooks 2022 1 Online-Ressource (44 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index This IBM® blueprint publication focuses on early threat detection within a database environment by using IBM Security Guardium® Data Protection and IBM QRadar®. It also highlights how to proactively start a cyber resilience workflow in response to a cyberattack or potential malicious user actions. The workflow that is presented here uses IBM Copy Services Manager as orchestration software to start IBM FlashSystem® Safeguarded Copy functions. The Safeguarded Copy creates an immutable copy of the data in an air-gapped form on the same IBM FlashSystem for isolation and eventual quick recovery. This document describes how to enable and forward Oracle database user activities (by using IBM Security Guardium Data Protection) and IBM FlashSystem audit logs by using IBM FlashSystem to IBM QRadar. This document also describes how to create various rules to determine a threat, and configure and launch a suitable response to the detected threat in IBM QRadar. The document also outlines the steps that are involved to create a Scheduled Task by using IBM Copy Services Manager with various actions. Computer networks Security measures Information technology Security measures Computer security Management Data protection Réseaux d'ordinateurs ; Sécurité ; Mesures Technologie de l'information ; Sécurité ; Mesures Sécurité informatique ; Gestion Protection de l'information (Informatique) Computer networks ; Security measures Computer security ; Management Information technology ; Security measures Bhandari, Raninder Ravi VerfasserIn aut |
spellingShingle | Shingornikar, Shashank Bhandari, Raninder Ravi Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy Computer networks Security measures Information technology Security measures Computer security Management Data protection Réseaux d'ordinateurs ; Sécurité ; Mesures Technologie de l'information ; Sécurité ; Mesures Sécurité informatique ; Gestion Protection de l'information (Informatique) Computer networks ; Security measures Computer security ; Management Information technology ; Security measures |
title | Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy |
title_auth | Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy |
title_exact_search | Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy |
title_full | Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy Shashank Shingornikar, Raninder Ravi Bhandari |
title_fullStr | Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy Shashank Shingornikar, Raninder Ravi Bhandari |
title_full_unstemmed | Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy Shashank Shingornikar, Raninder Ravi Bhandari |
title_short | Proactive early threat detection and securing Oracle Database with IBM QRadar, IBM Security Guardium Database Protection, and IBM Copy Services Manager by using IBM FlashSystem Safeguarded Copy |
title_sort | proactive early threat detection and securing oracle database with ibm qradar ibm security guardium database protection and ibm copy services manager by using ibm flashsystem safeguarded copy |
topic | Computer networks Security measures Information technology Security measures Computer security Management Data protection Réseaux d'ordinateurs ; Sécurité ; Mesures Technologie de l'information ; Sécurité ; Mesures Sécurité informatique ; Gestion Protection de l'information (Informatique) Computer networks ; Security measures Computer security ; Management Information technology ; Security measures |
topic_facet | Computer networks Security measures Information technology Security measures Computer security Management Data protection Réseaux d'ordinateurs ; Sécurité ; Mesures Technologie de l'information ; Sécurité ; Mesures Sécurité informatique ; Gestion Protection de l'information (Informatique) Computer networks ; Security measures Computer security ; Management Information technology ; Security measures |
work_keys_str_mv | AT shingornikarshashank proactiveearlythreatdetectionandsecuringoracledatabasewithibmqradaribmsecurityguardiumdatabaseprotectionandibmcopyservicesmanagerbyusingibmflashsystemsafeguardedcopy AT bhandariraninderravi proactiveearlythreatdetectionandsecuringoracledatabasewithibmqradaribmsecurityguardiumdatabaseprotectionandibmcopyservicesmanagerbyusingibmflashsystemsafeguardedcopy |