Главная
Study mode:
on
1
Introduction
2
Network Security Monitoring
3
Log Stash
4
Qabbani
5
Log Stash Configuration File
6
Log Normalization
7
Custom Patterns
8
Normalization
9
Conditional Statements
10
Add Field
11
GeoIP
12
Date Matching
13
Translate
14
Dictionary Hash
15
External Sources
16
Email Output
17
Email Alerts
18
Cabana Dashboard
19
Threat Intel Feed
20
Scripts
21
Environment Overview
22
Leonardo DiCaprio
23
Network Scanning
24
OpenBoss
25
Commercial Options
26
Service Safe
27
Auto patching
28
Cost
29
Future work
30
Questions
Description:
Explore defensive network security techniques using a Raspberry Pi in this BSidesSF 2016 conference talk. Learn about Network Security Monitoring, Log Stash configuration, log normalization, and custom patterns. Discover how to implement conditional statements, add fields, and utilize GeoIP and date matching. Delve into translation techniques, dictionary hashes, and external sources for enhanced security. Gain insights on email outputs and alerts, Cabana Dashboard implementation, and integrating threat intelligence feeds. Examine network scanning tools, commercial options, and auto-patching strategies. Conclude with a discussion on costs, future developments, and a Q&A session to deepen your understanding of deploying a defensive Raspberry Pi setup.

Sweet Security - Deploying a Defensive Raspberry Pi

Add to list
0:00 / 0:00