A comprehensive research on Cyber Security Operations System (SOC): Modeling, Architectures and Classifications
Publish Year: 1395
نوع سند: مقاله کنفرانسی
زبان: English
View: 977
This Paper With 21 Page And PDF Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
TEDECE02_126
تاریخ نمایه سازی: 21 شهریور 1395
Abstract:
The cyber safety threats can be caused due to viruses, hackers, identifying thieves, spyware. The virus infects the computer through the email attachment and file sharing. One infected computer can cause problems to all the computer networks. A people who trespass the computer from a remote location are considered as Hackers. These people use a computer to send spam or viruses or do other activities that cause computer malfunction. In the case of identifying thieves, the people who obtain unauthorized access to the personal information like social security, and financial account numbers are considered. Spyware is software that piggybacks on programs that are downloaded and gathers information about online habits and transmits personal information without the user’s knowledge.Cyber security operations Centre (CSOC) is an essential business control aimed to protect ICT systems and support an organization’s Cyber Defense Strategy. Its overarching purpose is to ensure that incidents are identified and managed to resolution swiftly, and to maintain safe & secure business operations and services for the organization. A CSOC framework is proposed comprising Log Collection, Analysis, Incident Response, Reporting, Personnel and Continuous Monitoring.
Keywords:
Cyber Security Operations Centre(CSOC) , Security Operations Center(SOC) , Log Source , Risk Management , Correlation Analysis , Correlation Rules , log management , storage , event fields , mobile-agent
Authors
abbas karimi
Dep.of Computer & Communication Systems Engineering, Faculty of Engineering,AU,UPM*,
Mahboobeh ziea ghoochani
MSC Student in Computer Networks Ashtian Azad University AU, Ashtian ,Arak ,Iran
مراجع و منابع این Paper:
لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :