{"response":{"docs":[{"system_create_dtsi":"2020-06-22T19:47:25Z","system_modified_dtsi":"2020-07-10T14:53:34Z","has_model_ssim":["StudentWork"],"id":"79407z49q","accessControl_ssim":["5f0f3947-660e-4d81-8f6e-8414d8e85b27"],"hasRelatedMediaFragment_ssim":["736666030"],"hasRelatedImage_ssim":["736666030"],"depositor_ssim":["cechlibsvc@ucmail.uc.edu"],"depositor_tesim":["cechlibsvc@ucmail.uc.edu"],"title_tesim":["SIEMStack"],"date_uploaded_dtsi":"2020-06-22T19:47:24Z","date_modified_ssi":"Fri Jul 10 10:53:33 2020","isPartOf_ssim":["admin_set/default"],"advisor_tesim":["Vykhovanyuk, Bogdan"],"degree_tesim":["BS (Information Technology)"],"college_tesim":["Education, Criminal Justice, and Human Services"],"department_tesim":["Information Technology"],"creator_tesim":["Graham, Kyle","Lazarte, Joseph"],"publisher_tesim":["University of Cincinnati"],"description_tesim":["SIEMStack is a full featured, ready to deploy, Open Source SIEM solution tailored towards small business, nonprofit, and educational users. SIEMStack comes with pre-packaged configurations and an installation experience that makes it a breeze for organizations to deploy SIEM. SIEMStack models its alerting on the MITRE ATT\u0026CK framework, an industry standard set of TTP (Tactics, Techniques, and Procedures) used by cyber adversaries; both primitive and advanced. Our mission is to strengthen the security posture of our user’s organizations and prevent the widespread damage caused by cyber breaches. "],"license_tesim":["http://creativecommons.org/licenses/by-nc-nd/4.0/"],"date_created_tesim":["2019-04"],"thumbnail_path_ss":"/downloads/736666030?file=thumbnail","suppressed_bsi":false,"actionable_workflow_roles_ssim":["admin_set/default-default-depositing"],"workflow_state_name_ssim":["deposited"],"member_ids_ssim":["736666030","kp78gh85m"],"member_of_collections_ssim":["2019 CECH Information Technology Senior Design Projects"],"member_of_collection_ids_ssim":["vq27zp836"],"file_set_ids_ssim":["736666030","kp78gh85m"],"visibility_ssi":"open","admin_set_tesim":["Default Admin Set"],"sort_title_ssi":"SIEMSTACK","human_readable_type_tesim":["Student Work"],"read_access_group_ssim":["public"],"edit_access_group_ssim":["admin"],"edit_access_person_ssim":["cechlibsvc@ucmail.uc.edu"],"nesting_collection__ancestors_ssim":["vq27zp836"],"nesting_collection__parent_ids_ssim":["vq27zp836"],"nesting_collection__pathnames_ssim":["vq27zp836/79407z49q"],"nesting_collection__deepest_nested_depth_isi":2,"_version_":1697124950466363392,"timestamp":"2021-04-15T16:34:36.992Z","score":0.00049999997}],"facets":[{"name":"human_readable_type_sim","items":[{"value":"Student Work","hits":1,"label":"Student Work"}],"label":"Human Readable Type Sim"},{"name":"creator_sim","items":[{"value":"Graham, Kyle","hits":1,"label":"Graham, Kyle"},{"value":"Lazarte, Joseph","hits":1,"label":"Lazarte, Joseph"}],"label":"Creator Sim"},{"name":"subject_sim","items":[],"label":"Subject Sim"},{"name":"college_sim","items":[{"value":"Education, Criminal Justice, and Human Services","hits":1,"label":"Education, Criminal Justice, and Human Services"}],"label":"College Sim"},{"name":"department_sim","items":[{"value":"Information Technology","hits":1,"label":"Information Technology"}],"label":"Department Sim"},{"name":"language_sim","items":[],"label":"Language Sim"},{"name":"publisher_sim","items":[{"value":"University of Cincinnati","hits":1,"label":"University of Cincinnati"}],"label":"Publisher Sim"},{"name":"date_created_sim","items":[{"value":"2019-04","hits":1,"label":"2019-04"}],"label":"Date Created Sim"},{"name":"member_of_collection_ids_ssim","items":[{"value":"vq27zp836","hits":1,"label":"vq27zp836"}],"label":"Member Of Collection Ids Ssim"},{"name":"generic_type_sim","items":[{"value":"Work","hits":1,"label":"Work"}],"label":"Generic Type Sim"}],"pages":{"current_page":1,"next_page":null,"prev_page":null,"total_pages":1,"limit_value":10,"offset_value":0,"total_count":1,"first_page?":true,"last_page?":true}}}