A comprehensive research on Cyber Security Operations System (SOC): Modeling, Architectures and Classifications

Publish Year: 1395
نوع سند: مقاله کنفرانسی
زبان: English
View: 977

This Paper With 21 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

TEDECE02_126

تاریخ نمایه سازی: 21 شهریور 1395

Abstract:

The cyber safety threats can be caused due to viruses, hackers, identifying thieves, spyware. The virus infects the computer through the email attachment and file sharing. One infected computer can cause problems to all the computer networks. A people who trespass the computer from a remote location are considered as Hackers. These people use a computer to send spam or viruses or do other activities that cause computer malfunction. In the case of identifying thieves, the people who obtain unauthorized access to the personal information like social security, and financial account numbers are considered. Spyware is software that piggybacks on programs that are downloaded and gathers information about online habits and transmits personal information without the user’s knowledge.Cyber security operations Centre (CSOC) is an essential business control aimed to protect ICT systems and support an organization’s Cyber Defense Strategy. Its overarching purpose is to ensure that incidents are identified and managed to resolution swiftly, and to maintain safe & secure business operations and services for the organization. A CSOC framework is proposed comprising Log Collection, Analysis, Incident Response, Reporting, Personnel and Continuous Monitoring.

Authors

abbas karimi

Dep.of Computer & Communication Systems Engineering, Faculty of Engineering,AU,UPM*,

Mahboobeh ziea ghoochani

MSC Student in Computer Networks Ashtian Azad University AU, Ashtian ,Arak ,Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Kutub Thakur, Meikang Qiu, Keke Gai and Md Liakt ...
  • and Cloud Computing, 2015. ...
  • Michael E. Kuhl, Moises Sudit, Jason Kistner and Kevin Costantini, ...
  • Cyril Onwubiko, Cyber Security Operations Centre: ...
  • Pierre Jacobs, Alapan Arnab and Barry Irwin, Classification of Security ...
  • Emmanuel Hooper, Intellient Strategies and Techniques for Effective Cyber Security, ...
  • Technology and Automation, IEEE, 2011. ...
  • Shuhong Yuan and Chijia Zou, the Security Operations Center Based ...
  • Afsaneh Madani, Saed Rezayi and Hossein Gharaee, _ _ _ ...
  • Jung-Shian Li and Che-Jen Hsieh, Implementation of ...
  • C onferenc e-TED 2016 1-2 June, Kerman shah, Iran ...
  • نمایش کامل مراجع