EINSTEIN 2
E97783
EINSTEIN 2 is a U.S. federal intrusion detection system that monitors government network traffic for known cyber threats as part of the broader EINSTEIN cybersecurity program.
Observed surface forms (1)
| Surface form | Occurrences |
|---|---|
| EINSTEIN 1 | 1 |
Statements (43)
| Predicate | Object |
|---|---|
| instanceOf |
cybersecurity system
ⓘ
federal intrusion detection system ⓘ |
| abbreviation | E2 ⓘ |
| architectureRole | sensor layer of the EINSTEIN program ⓘ |
| associatedWith | National Cybersecurity Protection System ⓘ |
| basedOn | network intrusion detection technology ⓘ |
| country |
United States of America
ⓘ
surface form:
United States
|
| dataTypeMonitored |
network flow data
ⓘ
packet header information ⓘ |
| deploymentModel | centralized monitoring at internet access points ⓘ |
| designedFor | real-time network monitoring ⓘ |
| detects |
known cyber threats
ⓘ
malicious network traffic signatures ⓘ |
| distinguishedFrom |
EINSTEIN 3
ⓘ
surface form:
EINSTEIN 3 Accelerated
|
| focus | known threat signatures rather than zero-day attacks ⓘ |
| followedBy | EINSTEIN 3 ⓘ |
| goal |
early detection of cyber intrusions
ⓘ
improving situational awareness of federal network security ⓘ |
| implementedBy |
National Cybersecurity Protection System
ⓘ
surface form:
US-CERT
National Cybersecurity and Communications Integration Center ⓘ
surface form:
United States Computer Emergency Readiness Team
|
| monitors |
U.S. federal government network traffic
ⓘ
traffic entering federal networks ⓘ traffic leaving federal networks ⓘ |
| operatedBy |
National Cybersecurity and Communications Integration Center
ⓘ
surface form:
DHS Office of Cybersecurity and Communications
United States Department of Homeland Security ⓘ
surface form:
U.S. Department of Homeland Security
|
| owner | U.S. federal government NERFINISHED ⓘ |
| partOf |
EINSTEIN
ⓘ
surface form:
EINSTEIN program
|
| policyConcern | privacy and civil liberties ⓘ |
| predecessor |
EINSTEIN 2
self-linksurface differs
ⓘ
surface form:
EINSTEIN 1
|
| purpose |
intrusion detection
ⓘ
monitoring known cyber threats ⓘ protecting federal civilian executive branch networks ⓘ |
| regulatoryFramework |
Federal Information Security Management Act of 2002
ⓘ
surface form:
FISMA
Federal Information Security Management Act of 2002 ⓘ
surface form:
Federal Information Security Management Act
|
| relatedTo |
CDM program
ⓘ
Continuous Diagnostics and Mitigation tools ⓘ
surface form:
Continuous Diagnostics and Mitigation program
|
| scope | federal civilian executive branch agencies ⓘ |
| securityDomain |
intrusion detection
ⓘ
network security ⓘ |
| targetUser | federal civilian agencies security operations centers ⓘ |
| technologyType | network perimeter monitoring system ⓘ |
| threatIntelligenceSource | US-CERT signatures and indicators of compromise ⓘ |
| uses | signature-based detection ⓘ |
Referenced by (2)
Full triples — surface form annotated when it differs from this entity's canonical label.
this entity surface form:
EINSTEIN 1