Directory Image
This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.

Iteration 1: Orientation to Splunk Network Security

Author: Janet Peter
by Janet Peter
Posted: Mar 08, 2019
personal communicati

Plan

The iteration process is scheduled to take about two weeks. The introduction session shall involve conducting research through the web to discover modern technologies as well as areas that implement splunk tools. The session shall involve research from websites, from books, as well as through libraries checking. The research operations shall take two days. The research work shall a personal guidance far familiarizing with splunk technologies. Another period of three days shall be used to study in details areas within the network where splunk tools are applied. The session shall involve meeting with experts as well as analyzing several network infrastructures that apply the use of splunk systems (R. W. Attar, Personal communication, April 01, 2017). Research shall be required to perform benchmarking network systems that analyze business operations using splunk technology. The first week activities shall be supervised by Mrs. Attar, the Chief Systems Security (CSS). The first half of the second week during orientation process shall include understanding the structure of the splunk system. The study shall perform analysis on the current planning and designing of security measures. The study shall check on how various technologies are applied to implement security. The researcher shall learn how a complete system infrastructure is drawn as well as tools embedded within network systems (T. P. Frank, Personal communication, April 02, 2017). Mr. Frank shall guide researchers on covering various security infrastructures, applications, and a tool that’s implement splunk.

The second half of the second week shall involve researchers classifying various software and hardware tools and their corresponding security requirements. The session shall define criteria as well as the strategies applied by splunk tools to facilitate effective security measures (H. K. Beth, Personal communication, April 04, 2017). Researchers shall be expected to understand techniques as well as criteria applied by systems to implement security parameters. Miss shall facilitate the session. Beth Chief information Officer (CIO).

Action

I took part in conducting internet research studies to analyze various areas where splunk technology is applied. Among the domains where splunk tools are vital to include providing security, and compliance in business operations through eliminating frauds such as a white collar. According to online research conducted from https://dzone.com/articles/machine-data-analytics-splunk, splunk tool is applied in infrastructure and operations management to facilitate monitoring IT silos. It facilitates effective and efficient delivering of systems applications on time and based on high level of accuracy. Through benchmarking operations, I managed to visit most of the Internet of Things (IOT) and applied industries. Most domains where splunk technology is appropriate to include in collecting data and information from devices, managing and controlling other systems, and being applied as sensors. Splunk tools were also applied in Supervisory control and data acquisition (SCADA) systems. Other uses included controlling operations of handheld devices such as mobile phones and point of sale devices (R. W. Attar, Personal communication, April 07, 2017).

The structure of the Splunk systems is composing of two main divisions. One of the divisions is a machine to machine architecture as well as human to human architecture. Among the embedded systems within Splunk tool include using processor-based architectures. It has systems HVAC controllers, Smart electronic meters, Global Positioning Systems (GPS) devices and Radio Frequency Identification (RFID) devices (T. P. Frank, Personal communication, April 08, 2017). Other areas that incorporate spunk includes automobile devices, medical devices, as well as other systems that implement machine data and information.

The techniques applied in Splunk systems include incorporation of systems software operations such as business analysis. It implements principles of visibility and business intelligence. It is based on learning situations to produce inferences such as trends and patterns. It mainly uses criteria of diagnosing, as well finding and fixing problems with and intention of fixing particular issues (H. K. Beth, Personal communication, April 09, 2017).

Observation

The observations identify during personal research has found that application of splunk tool is vital especially in managing to control and running business operations. The most effective and efficient operations including in the field of network security, systems analysis as well as in finding trends, patterns, and behavior. Machine learning is an application that was most applicable in almost all fields. Significance technologies noted as one of the implementers of Slunk include the big data technology, cloud computing, and Internet of Things (IOT) (R. W. Attar, Personal communication, April 10, 2017). Direct applications of the Splunk tools is recording user transactions, customer behavior, sensing security vulnerabilities, as well as learning machine behavior. In security operations within networked infrastructures, Plunk tools are set and configured to provide effective and efficient incident response capabilities in business operations.

The splunk tool has high-level usability techniques such as real-time correlation as well as in-depth monitoring of systems across data and information sources. It performs analysis that proofs effective statistical analysis for advanced pattern detection as well as identification of threat and defense mechanisms. In networking, the complexity of network utilities is made easy through the use of splunk tools. Tools guarantee complete resolving of problems, identifying infrastructural services (T. P. Frank, Personal communication, April 11, 2017). It is a tool that guarantees complete quality assurance regarding troubleshooting, isolation of network problems as well as assuring that information and data security is given priority. Among the data and information management platforms, the software components observed during benchmarking process included splunk applications. It has several categories of applications such as VMware, Microsoft, Cisco hardware, Microsoft Active Directory, and Citrix. The process of coping with issues of compatibility splunk supports alternative software such as Linux Unix, Windows, and virtual technologies among others (H. K. Beth, Personal communication, April 12, 2017).

Reflection

The main goal of orientation process is to familiarize understand as well appreciate the various components and contents of the Splunk tools. The orientation session has equipped me with adequate resources that have highly led to complete appreciating the functionalities of splunk tools in technology. Among the successfully introduced areas included business insight (R. W. Attar, Personal communication, April 15, 2017). Splunk facilitates making better and informed decision making through understanding various business analyzed information that incorporates trends, patterns, and behavior. It enhances intelligence support in the events concerning data and information security. The introduction session has also covered areas such as the operations visibility implemented through maintaining records for future references. Splunk guarantees proactive observations through monitoring sensitive infrastructures such as networks. It facilitates effective understanding of business issues, problems, and attacks before they strike in the organization causing adverse effects on customer’s services, revenue, and personal data (T. P. Frank, Personal communication, April 16, 2017).

Through research, Splunk is applied in facilitating investigative analysis with the intention of bringing changes within multiple data and information sources. The tools are vital in bringing new methodologies of trailing attackers, intruders, and insiders. The tool guarantees fast and effective responses within the shortest time. Research involving orientation to the organization. Connections and embedding various software systems is possible such as integrating relational data and information databases, facilitating bi-directional connectivity, as well as establishing Hadoop data and information linkage. The future analysis shall facilitate effective and efficient implementation of future iterations through incorporating the acquired knowledge. Among the observed and future research work shall be based on Splunk infrastructures that focus at learning g from huge business operations such as Amazon Web Services (AWS) (H. K. Beth, Personal communication, April 17, 2017).

Carolyn Morgan is the author of this paper. A senior editor at Melda Research in Reliable Essay Writing Service if you need a similar paper you can place your order for a custom research paper from Trustworthy Custom Essay Writing Service.

About the Author

"Janet Peter is the Managing Director of a globally competitive essay writing company.

Rate this Article
Leave a Comment
Author Thumbnail
I Agree:
Comment 
Pictures
  • Guest  -  4 years ago

    Online case study help services have become very popular for those seeking business case study writing as they engage the best Case Study Writing Services.

Author: Janet Peter
Premium Member

Janet Peter

Member since: Dec 11, 2017
Published articles: 349

Related Articles