2015 48th Hawaii International Conference on System Sciences 2015
DOI: 10.1109/hicss.2015.270
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Designing a Security Operations Centre (SOC)

Abstract: Owning a SOC is an important status symbol for many organizations. Although the concept of a 'SOC' can be considered a hype, only a few of them are actually effective in counteracting cybercrime and IT abuse. A literature review reveals that there is no standard framework available and no clear scope or vision on SOCs. In most of the papers, specific implementations are described, although often with a commercial purpose. Our research was focused on identifying and defining the generic building blocks for a SO… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
42
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 32 publications
(45 citation statements)
references
References 0 publications
0
42
0
Order By: Relevance
“…In contrast, [23] clearly state the threat intelligence as one of the functions of the SOC. In addition to that, the framework in [23] makes essential cyber security functions such as vulnerability scans and penetration testing functions as part of the SOC.…”
Section: Cyber Security Operation Center (Soc)mentioning
confidence: 96%
See 4 more Smart Citations
“…In contrast, [23] clearly state the threat intelligence as one of the functions of the SOC. In addition to that, the framework in [23] makes essential cyber security functions such as vulnerability scans and penetration testing functions as part of the SOC.…”
Section: Cyber Security Operation Center (Soc)mentioning
confidence: 96%
“…In contrast, [23] clearly state the threat intelligence as one of the functions of the SOC. In addition to that, the framework in [23] makes essential cyber security functions such as vulnerability scans and penetration testing functions as part of the SOC. This function is not specified in the study by [21] because generally this function can be implemented by the organization's ITC or any qualified third party.…”
Section: Cyber Security Operation Center (Soc)mentioning
confidence: 96%
See 3 more Smart Citations