Introduction to SOC Analysis | part of Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC | Wiley Data and Cybersecurity books | IEEE Xplore
; ; ;

Chapter Abstract:

Summary Security operations center (SOC) is a centralized entity that monitors and defends an organization's information systems against intrusions. At a high level, an S...Show More

Chapter Abstract:

Summary

Security operations center (SOC) is a centralized entity that monitors and defends an organization's information systems against intrusions. At a high level, an SOC is responsible for three key activities: monitoring, detection, and response. An SOC typically has a hierarchical team structure with different roles and responsibilities. Selecting the correct SOC model is a major decision for every business since it can have a major influence on the success and effectiveness of security operations. Establishing business goals is a crucial step in selecting the best SOC model for a company. A company must comprehend its overall business goals and how they relate to cybersecurity before choosing an SOC model. While establishing an SOC, numerous key components must be considered, including SOC design principles, building blocks, staffing and organization, technology and tools, and processes and procedures. This chapter also presents an overview of the key concepts discussed in the subsequent chapters of this book.

Page(s): 1 - 19
Copyright Year: 2025
Edition: 1
ISBN Information:

Contact IEEE to Subscribe