AP Cybersecurity 1.5 Exercise 1: AI Security Log Analyzer

AP Cybersecurity — Unit 1, Topic 1.5

Exercise 1: AI Security Log Analyzer

Analyze security event logs to identify which entries an AI-powered SIEM would flag — then compare your predictions to the AI analysis.

Lesson 5 of 5 Predict-First Format ~20 min SIEM · Anomaly Detection · Human Oversight
Key Terms: SIEM (Security Information and Event Management) — correlates logs from multiple sources; False Positive — a benign event flagged as a threat; Alert Fatigue — analysts becoming desensitized due to too many low-quality alerts; Anomaly Detection — identifying events that deviate from a learned baseline.
Exercise Progress 0 / 4
Context
Scenario: Midnight Analytics Inc.
You are a junior security analyst at Midnight Analytics Inc. Your company uses an AI-powered SIEM to monitor security events across 200 endpoints. The SIEM has learned a behavioral baseline over 90 days and flags events that deviate significantly from normal patterns.

Below are four security log entries from last Tuesday. Before seeing the AI’s analysis, predict whether each entry should be flagged as suspicious or not. Then reveal the AI’s verdict and explanation.
Log Entry 1 of 4
Failed Login Spike
Event: User account jsmith@midnight.com generated 847 failed login attempts from IP 203.0.113.42 between 02:14 and 02:18 AM.
Context: Normal login behavior for this user is 1–3 logins per day from office IP 192.168.1.0/24 during business hours.
▷ Predict First Before revealing the AI verdict — should the SIEM flag this entry? Think about: volume of attempts, time of day, IP address, and deviation from baseline.
Log Entry 2 of 4
Large Outbound Data Transfer
Event: Workstation W-114 transferred 4.2 GB to external IP 185.220.101.77 at 11:45 AM on Tuesday.
Context: This workstation belongs to a data analyst whose role regularly involves uploading reports to cloud storage. Average outbound transfer for this user is 3.8 GB per day to known cloud storage IPs. The destination IP is not in any known-good list.
▷ Predict First The transfer volume is normal for this user. But is there something else worth flagging here?
Log Entry 3 of 4
Software Deployment Alert
Event: 180 endpoints simultaneously installed update package "WinPatch-KB5031356" at 10:00 AM Tuesday.
Context: IT Operations sent a company-wide notice Monday at 4:00 PM announcing a mandatory security patch deployment for Tuesday at 10:00 AM. The patch is from Microsoft and matches a known SHA-256 hash in the SIEM’s trusted software catalog.
▷ Predict First Mass simultaneous software installation often triggers AI alerts. Should it in this case?
Log Entry 4 of 4
Privileged Account After-Hours Access
Event: Administrator account admin-dchen accessed the HR database at 11:52 PM on Tuesday, exported 2,400 employee records, then logged out at 12:03 AM.
Context: Admin accounts are permitted to access all systems. The user has accessed the HR database 3 times in the past 90 days, always during business hours for system maintenance. No maintenance ticket was filed for this access.
▷ Predict First This is a legitimate admin account. Does that change whether the activity should be flagged?
+ Extension Challenge Design one additional log entry scenario where a legitimate action could be misclassified as an attack. What context would need to be integrated into the SIEM to prevent the false positive?

Get in Touch

Whether you're a student, parent, or teacher — I'd love to hear from you.

Just want free AP CS resources?

Enter your email below and check the subscribe box — no message needed. Students get daily practice questions and study tips. Teachers get curriculum resources and teaching strategies.

Typically responds within 24 hours

Message Sent!

Thanks for reaching out. I'll get back to you within 24 hours.

🏫 Welcome, fellow educator!

I offer curriculum resources, practice materials, and study guides designed for AP CS teachers. Let me know what you're looking for — whether it's classroom materials, a guest speaker, or Teachers Pay Teachers resources.

Email

tanner@apcsexamprep.com

📚

Courses

AP CSA, CSP, & Cybersecurity

Response Time

Within 24 hours

Prefer email? Reach me directly at tanner@apcsexamprep.com