SOC- and SIC-based information security monitoring

6Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

New numerous and sophisticated attacks make organizations’ IT infrastructure (ITI) break-in more professional and dangerously effective. The organizations must oppose this properly designed and centralized information security (IS) incident management system. Learn from the past helps to avoid the consequences of serious IS incidents in the future. Therefore, IS monitoring is necessary for rapidly detecting IS incidents, minimizing loss and destruction, mitigating the vulnerabilities exploited and restoring organization’s ITI. This process can be implemented based on Security Operations Centers (SOCs) and Security Intelligence Centers (SICs) as their next evolution step. SOCs’ main functions and serious limitations are defined. The SICs’ concept and functioning are analyzed. The main ideas of further research conclude the paper.

Cite

CITATION STYLE

APA

Miloslavskaya, N. (2017). SOC- and SIC-based information security monitoring. In Advances in Intelligent Systems and Computing (Vol. 570, pp. 364–374). Springer Verlag. https://doi.org/10.1007/978-3-319-56538-5_37

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free