Cyber Security Operations Centre Security Monitoring for protecting Business and supporting Cyber Defense Strategy

被引:0
|
作者
Onwubiko, Cyril [1 ]
机构
[1] Res Series, E Secur Grp, Intelligence & Secur Assurance, London, England
来源
2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA) | 2015年
关键词
Cyber Security Operations Centre; CSOC; SOC; Cyber Incident Response; Cyber Situational Awareness; CyberSA; Log Source; Analysis; Correlation; Risk Management; CSOC Strategy; CSOC Benefits & Challenges;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cyber security operations centre (CSOC) is an essential business control aimed to protect ICT systems and support an organisation's Cyber Defense Strategy. Its overarching purpose is to ensure that incidents are identified and managed to resolution swiftly, and to maintain safe & secure business operations and services for the organisation. A CSOC framework is proposed comprising Log Collection, Analysis, Incident Response, Reporting, Personnel and Continuous Monitoring. Further, a Cyber Defense Strategy, supported by the CSOC framework, is discussed. Overlaid atop the strategy is the well-known Her Majesty's Government (HMG) Protective Monitoring Controls (PMCs). Finally, the difficulty and benefits of operating a CSOC are explained.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] The Role of Situational Awareness in Cyber Security and Cyber Defense Strategy
    Onwubiko, Cyril
    2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2015,
  • [2] TRAINING OF CYBER SECURITY AND CYBER DEFENSE FOR SPECIALISTS OF FINANCE, ECONOMIC AND BUSINESS MANAGEMENT
    Bykov, Valeriy Yu
    Romanovsky, Alexander A.
    Romanovskaya, Julia Yu
    INFORMATION TECHNOLOGIES AND LEARNING TOOLS, 2020, 80 (06) : 386 - 413
  • [3] Leveraging Information Security Continuous Monitoring for Cyber Defense
    AlSadhan, Tina
    Park, Joon
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 401 - 408
  • [4] An Intelligent Security Assistant for Cyber Security Operations
    Sayan, Carla Maria
    Hariri, Salim
    Ball, George
    2017 IEEE 2ND INTERNATIONAL WORKSHOPS ON FOUNDATIONS AND APPLICATIONS OF SELF* SYSTEMS (FAS*W), 2017, : 375 - 376
  • [5] The cyber security strategy of Israel
    Burak, Daricili Ali
    Emin, Erendor Mehmet
    VOPROSY ISTORII, 2021, 11 (03) : 233 - 246
  • [6] Cyber Security Strategy released
    不详
    WEM-WATER ENGINEERING & MANAGEMENT, 2002, 149 (11): : 8 - 8
  • [7] Cyber Security of Cyber Physical Systems: Cyber Threats and Defense of Critical Infrastructures
    Shukla, Sandeep K.
    2016 29TH INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2016 15TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2016, : 30 - 31
  • [8] Hardware Security Kernel for Cyber Defense
    Jungwirth, Patrick
    Ross, James
    Secrest, Barry
    Barnett, Thomas
    Chan, Philip
    DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES II, 2019, 11013
  • [9] Cyber Teaming and Role Specialization in a Cyber Security Defense Competition
    Buchler, Norbou
    La Fleur, Claire Genevieve
    Hoffman, Blaine
    Rajivan, Prashanth
    Marusich, Laura
    Lightner, Lewis
    FRONTIERS IN PSYCHOLOGY, 2018, 9
  • [10] Cyber Defense Through Hardware Security
    Jungwirth, Patrick
    Chan, Philip
    Barnett, Thomas, Jr.
    Badawy, Abdel-Hameed
    DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES, 2018, 10652