Security Concerns Towards Security Operations Centers

A security operations center (SOC) is a centralized place for monitoring and frequently managing the safety and security of the company's status. The primary purpose of SOC is to enable better incident detection, investigation, and response capabilities by using data from endpoint devices, logs, security systems, and network flows. Moreover, an efficient SOC can help the organizations enhance the ability of situational awareness and increase the deployment of enterprise resources to mitigate the security issues. However, the cyber threats are the significant challenges for SOC. In this paper, the authors expressed some security threats towards SOC and several solutions to fight against them.

[1]  Chris Anley,et al.  Advanced SQL Injection In SQL Server Applications , 2002 .

[2]  Filip Jovanovic,et al.  Risk Management Impact Assessment on the Success of Strategic Investment Projects : Benchmarking Among Different Sector Companies , 2016 .

[3]  Kim-Kwang Raymond Choo,et al.  A survey of information security incident handling in the cloud , 2015, Comput. Secur..

[4]  Ramesh Karri,et al.  A Primer on Hardware Security: Models, Methods, and Metrics , 2014, Proceedings of the IEEE.

[5]  Mark Mohammad Tehranipoor,et al.  Trustworthy Hardware: Identifying and Classifying Hardware Trojans , 2010, Computer.

[6]  Shu Yun Lim,et al.  Security Issues and Future Challenges of Cloud Service Authentication , 2017 .

[7]  David Nathans,et al.  Designing and Building a Security Operations Center , 2014 .

[8]  Apostolos P. Fournaris,et al.  Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks , 2017 .

[9]  Barry Irwin,et al.  Classification of Security Operation Centers , 2013, 2013 Information Security for South Africa.

[10]  Berk Sunar,et al.  Trojan Detection using IC Fingerprinting , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[11]  Sven Ove Hansson,et al.  Ethical Criteria of Risk Acceptance , 2003 .

[12]  Jemal H. Abawajy,et al.  User preference of cyber security awareness delivery methods , 2014, Behav. Inf. Technol..

[13]  Danuta Zakrzewska,et al.  Fuzzy Logic Based Modeling for Building Contextual Student Group Recommendations , 2015, ICCCI.

[14]  Péter Vörös,et al.  Big Data Testbed for Network Attack Detection , 2016 .

[15]  Farinaz Koushanfar,et al.  A Unified Framework for Multimodal Submodular Integrated Circuits Trojan Detection , 2011, IEEE Transactions on Information Forensics and Security.

[16]  Christopher Jesse,et al.  Security Operation Center Concepts & Implementation , 2002 .

[17]  M. Breitner,et al.  Information security awareness and behavior: a theory-based literature review , 2014 .

[18]  Prasad Calyam,et al.  Intelligent Dashboard for augmented reality based incident command response co-ordination , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[19]  Baruch Fischhoff,et al.  The realities of risk-cost-benefit analysis , 2015, Science.