2020 IEEE Conference on Computer Applications(ICCA) 2020
DOI: 10.1109/icca49400.2020.9022821
|View full text |Cite
|
Sign up to set email alerts
|

Developing and Analysis of Cyber Security Models for Security Operation Center in Myanmar

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…These researchers consider all analyst functions to be the generic functions one would anticipate from an analyst. Similarly, Aung et al (2020) and Li et al (2016) discuss how analysts apply patches to fix vulnerabilities without assigning them to a particular tier. Also, analysts working for an in-house SOC (a SOC that is owned by the organisation it is protecting) may have different functions in comparison with analysts working for a SOC that offers its services as a Managed Security Service Provider (MSSP).…”
Section: Discussion and Research Implicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…These researchers consider all analyst functions to be the generic functions one would anticipate from an analyst. Similarly, Aung et al (2020) and Li et al (2016) discuss how analysts apply patches to fix vulnerabilities without assigning them to a particular tier. Also, analysts working for an in-house SOC (a SOC that is owned by the organisation it is protecting) may have different functions in comparison with analysts working for a SOC that offers its services as a Managed Security Service Provider (MSSP).…”
Section: Discussion and Research Implicationsmentioning
confidence: 99%
“…Analysts play a vital role in the operations of a SOC and the delivery of a SOC's services ( Aung et al, 2020;Axon et al, 2017 ). From a theoretical perspective, the activities and operations of analysts can be understood using the Activity Theory (AT) ( Sundaramurthy et al, 2016 ).…”
Section: Key Functions Of a Soc Analystmentioning
confidence: 99%
“…The 2016 Global Information Security Survey notes that SOC is available in 56% of the organizations surveyed [15]. The importance of unified, consolidated cybersecurity incident prevention, detection, and response [16] [17] will grow as more companies understand [18].…”
Section: Methodsmentioning
confidence: 99%