A comprehensive research on Cyber Security Operations System (SOC): Modeling, Architectures and Classifications

سال انتشار: 1395
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 984

فایل این مقاله در 21 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

TEDECE02_126

تاریخ نمایه سازی: 21 شهریور 1395

چکیده مقاله:

The cyber safety threats can be caused due to viruses, hackers, identifying thieves, spyware. The virus infects the computer through the email attachment and file sharing. One infected computer can cause problems to all the computer networks. A people who trespass the computer from a remote location are considered as Hackers. These people use a computer to send spam or viruses or do other activities that cause computer malfunction. In the case of identifying thieves, the people who obtain unauthorized access to the personal information like social security, and financial account numbers are considered. Spyware is software that piggybacks on programs that are downloaded and gathers information about online habits and transmits personal information without the user’s knowledge.Cyber security operations Centre (CSOC) is an essential business control aimed to protect ICT systems and support an organization’s Cyber Defense Strategy. Its overarching purpose is to ensure that incidents are identified and managed to resolution swiftly, and to maintain safe & secure business operations and services for the organization. A CSOC framework is proposed comprising Log Collection, Analysis, Incident Response, Reporting, Personnel and Continuous Monitoring.

نویسندگان

abbas karimi

Dep.of Computer & Communication Systems Engineering, Faculty of Engineering,AU,UPM*,

Mahboobeh ziea ghoochani

MSC Student in Computer Networks Ashtian Azad University AU, Ashtian ,Arak ,Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Kutub Thakur, Meikang Qiu, Keke Gai and Md Liakt ...
  • and Cloud Computing, 2015. ...
  • Michael E. Kuhl, Moises Sudit, Jason Kistner and Kevin Costantini, ...
  • Cyril Onwubiko, Cyber Security Operations Centre: ...
  • Pierre Jacobs, Alapan Arnab and Barry Irwin, Classification of Security ...
  • Emmanuel Hooper, Intellient Strategies and Techniques for Effective Cyber Security, ...
  • Technology and Automation, IEEE, 2011. ...
  • Shuhong Yuan and Chijia Zou, the Security Operations Center Based ...
  • Afsaneh Madani, Saed Rezayi and Hossein Gharaee, _ _ _ ...
  • Jung-Shian Li and Che-Jen Hsieh, Implementation of ...
  • C onferenc e-TED 2016 1-2 June, Kerman shah, Iran ...
  • نمایش کامل مراجع