Proceedings of the Proceedings of the 1st International Conference on Informatics, Engineering, Science and Technology, INCITES 2019
DOI: 10.4108/eai.18-7-2019.2287841
|View full text |Cite
|
Sign up to set email alerts
|

Success Factors for Cyber Security Operation Center (SOC) Establishment

Abstract: The boundless in the digital world is one of the terms used to describe the present state where everything depends mostly on the use of technology. The increased dependency on these technology services has indirectly increased the risk of threats and cyber-attacks. One of the popular solutions to defend against these threats is by implementing the Cyber Security Operation Center (SOC) to monitor, track and handle the cyber incidents. However, there are a number of factors that affect the success of the SOC. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(15 citation statements)
references
References 13 publications
0
15
0
Order By: Relevance
“…Research often describes operations within a SOC following the People, Processes, and Technologies (PPT) framework [3], [30]- [33]. This framework is used for various information technology topics like knowledge management [70] or customer relationship management [34].…”
Section: A Delimitation and Definitionmentioning
confidence: 99%
See 1 more Smart Citation
“…Research often describes operations within a SOC following the People, Processes, and Technologies (PPT) framework [3], [30]- [33]. This framework is used for various information technology topics like knowledge management [70] or customer relationship management [34].…”
Section: A Delimitation and Definitionmentioning
confidence: 99%
“…• Network Operations Center: A Network Operations Center (NOC) oversees identifying, investigating, prioritizing, escalating, and resolving problems [17], [38]. However, in NOCs, the addressed problems are different as the NOC focuses on incidents impacting the performance and availability of an organization's net- General Aspects References Definition & Delimitation [2], [3], [5], [17], [22]- [39] Architecture [3], [4], [6], [30], [34], [39]- [61] Operating Models [2], [3], [7], [25], [33], [46], [62]- [68] work [36], [72]. As incidents can occur on all systems not just networks, it is beneficial for organizations when the NOC and SOC teams work together.…”
Section: A Delimitation and Definitionmentioning
confidence: 99%
“…e IoE can be applied in various fields such as smart cities, smart homes, intelligent transportations, automated agriculture, and convenient healthcare (Figure 1). e IoE often suffers from its computation limitations in processing capabilities and fixed storage, leading to the lack of device safety, privacy, and performance [1][2][3][4][5][6]. Considering the ubiquitous application of IoE in our society, it is imperative to improve their security and performance Fig 1.…”
Section: Introductionmentioning
confidence: 99%
“…Many applications can lose our private information on banking, health, and location services due to these security constraints. A security measure is required to secure communication in which the interception of messages by malicious users cannot harm our privacy [3,8].…”
Section: Introductionmentioning
confidence: 99%
“…Based on previous research, SOC has been developed and implemented by organizations without adhering to specific guidelines or international standards. Besides, past research has also highlighted that no international guidelines and standards have been used by organizations to develop and implement the SOC [13]. This is reflected in the inequality and diversity of SOC infrastructure and its implementation [14].…”
Section: Introductionmentioning
confidence: 99%