Главная
Study mode:
on
1
Introduction
2
Network Security Monitoring
3
Log Stash
4
Elastic Search Database
5
Logstash
6
Install Kabana
7
Log Stash Configuration File
8
Log Normalization
9
Custom Patterns
10
Normalization
11
Conditional Statements
12
GeoIP
13
Remove key fields
14
Date matching
15
Translate
16
Dictionary Hash
17
External Sources
18
Email Output Plugin
19
Email Alerts
20
Cabana Dashboard
21
Threat Intel Feed
22
GeoIP Map
23
Scripting
24
Environment Overview
25
Leonardo DiCaprio
26
Network Scanning
27
Suite Security
28
Recommendations
29
Email Alert
30
Service Safe
31
Auto patching
32
Cost
33
Raspberry Pi 3
34
Firewall Integration
35
Security Onion
36
Wrapup
37
Dots in rows logs
38
Have I had a chance to play with 22
39
Any other questions
Description:
Explore how to deploy a defensive Raspberry Pi for IoT security in this 36-minute conference talk from BSidesSF 2016. Learn about using open-source software and free tools to monitor, protect, and mitigate threats in IoT environments. Discover the implementation of Network Security Monitoring, Log Stash, Elastic Search Database, and Kabana on inexpensive hardware. Dive into log normalization, custom patterns, conditional statements, GeoIP integration, and email alerts. Gain insights on creating Cabana dashboards, incorporating threat intel feeds, and setting up network scanning. Understand the benefits of Suite Security, auto-patching, and firewall integration. Get recommendations for cost-effective solutions using Raspberry Pi 3 and explore the potential of Security Onion for enhanced protection.

Sweet Security - Deploying a Defensive Raspberry Pi

Security BSides San Francisco
Add to list