Detecting and reacting to incidents is not a function of it security management.

When it comes to detecting and mitigating threats, speed is crucial. Security programs must be able to detect threats quickly and efficiently so attackers don’t have enough time to root around in sensitive data. A business’s defensive programs can ideally stop a majority of threats, because often they've been seen before—meaning they should know how to fight them. These threats are considered "known" threats. However, there are additional “unknown” threats that an organization aims to detect. This means the organization hasn't encountered them before, perhaps because the attacker is using brand-new methods or technologies.

Known threats can sometimes slip past even the best defensive measures, which is why most security organizations actively look for both known and unknown threats in their environment. So how can an organization try to detect both known and unknown threats?

There are several methods available in the defender's arsenal that can help:

Leveraging threat intelligence

Threat intelligence is a way of looking at signature data from previously seen attacks and comparing it to enterprise data to identify threats. This makes it particularly effective at detecting known threats, but not unknown. Threat intelligence is frequently used to great effect in Security Information and Event Management (SIEM), antivirus, Intrusion Detection System (IDS), and web proxy technologies.

Analyzing user and attacker behavior analytics

With user behavior analytics, an organization is able to gain a baseline understanding of what normal behavior for an employee would be: what kind of data they access, what times they log on, and where they are physically located, for example. That way, a sudden outlier in behavior—such as a 2 a.m. logon in Shanghai from someone who usually works from 9 to 5 in New York and doesn’t travel for business—stands out as unusual behavior and something a security analyst may need to investigate.

With attacker behavior analytics, there's no "baseline" of activity to compare information to; instead, small, seemingly unrelated activities detected on the network over time may in fact be breadcrumbs of activity that an attacker leaves behind. It takes both technology and the human mind to put these pieces together, but they can help form a picture of what an attacker may be up to within an organization's network.

Setting intruder traps

Some targets are just too tempting for an attacker to pass up. Security teams know this, so they set traps in hopes that an attacker will take the bait. Within the context of an organization's network, an intruder trap could include a honeypot target that may seem to house network services—especially appealing to an attacker, or “honey credentials” that appear to have user privileges an attacker would need in order to gain access to sensitive systems or data. When an attacker goes after this bait, it triggers an alert so the security team know there is suspicious activity in the network that should be investigated. Learn more about the different types of deception technology.

Conducting threat hunts

Instead of waiting for a threat to appear in the organization's network, a threat hunt enables security analysts to actively go out into their own network, endpoints, and security technology to look for threats or attackers that may be lurking as-yet undetected. This is an advanced technique generally performed by veteran security and threat analysts.

Ideally, a well-developed security threat detection program should include all of the above tactics, amongst others, to monitor the security of the organization's employees, data, and critical assets.

Threat detection requires a two-pronged approach

Threat detection requires both a human element, as well as a technical element. The human element includes security analysts who analyze trends, patterns in data, behaviors, and reports, as well as those who can determine if anomalous data indicates a potential threat or a false alarm.

But threat detection technology also plays a key part in the detection process. There's no magic bullet in threat detection—no single tool that will do the job. Instead, a combination of tools acts as a net across the entirely of an organization's network, from end to end, to try and capture threats before they become a serious problem.

A robust threat detection program should employ:

  • Security event threat detection technology to aggregate data from events across the network, including authentication, network access, and logs from critical systems.
  • Network threat detection technology to understand traffic patterns on the network and monitor traffic within and between trusted networks, as well as to the internet.
  • Endpoint threat detection technology to provide detailed information about possibly malicious events on user machines, as well as any behavioral or forensic information to aid in investigating threats.

By employing a combination of these defensive methods, you’ll be increasing your chances of detecting and mitigating a threat quickly and efficiently. Security is a continuous process, and nothing is guaranteed. It will be up to you and the resources and processes you put in place to keep your business as secure as possible.

What is the main purpose of security management?

Purpose of Security Management The goal of security management procedures is to provide a foundation for an organization's cybersecurity strategy. The information and procedures developed as part of security management processes will be used for data classification, risk management, and threat detection and response.

Which technique ensures that security incidents don t occur?

Prevention – ensuring that security incidents don't occur. Preventative methods could include securing network devices and centralizing firewalls to reduce the threat of external attacks.

What is the meaning of security management?

Security management is the identification of an organization's assets (including people, buildings, machines, systems and information assets), followed by the development, documentation, and implementation of policies and procedures for protecting assets.

What is the importance of security management in criminology?

A vigilant security force deters criminals who are intent on committing theft, vandalism, sabotage, cyber attacks, physical violence or terrorism. Without the proactive work of security guards, law enforcement would be overwhelmed, as it reacts to crimes that otherwise would likely have been prevented.