Open-source security operations center (SOC) : a complete guide to establishing, managing, and maintaining a modern SOC / Alfred Basta, Nadine Basta, Waqar Anwar, Mohammad Ilyas Essar.

By: Basta, Alfred [author.]
Contributor(s): Basta, Nadine [author.] | Anwar, Waqar [author.] | Essar, Mohammad Ilyas [author.]
Language: English Publisher: Hoboken, New Jersey : Wiley, [2025]Copyright date: ©2025Description: 1 online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9781394201600Subject(s): Cyberinfrastructure -- Security measures | Computer networks -- Security measures | Cyberterrorism -- PreventionGenre/Form: Electronic books.DDC classification: 005.8068 LOC classification: QA76.9.A25 | B3825 2025Online resources: Full text is available at Wiley Online Library Click here to view Summary: "The Security Operation Center (SOC) is a centralized function within an organization that uses people, procedures, and technology to prevent, identify, analyze, and respond to cybersecurity incidents while continuously monitoring and improving an organization's security posture. The emergence of sophisticated threats placed a premium on gathering context from several sources. An SOC is a central command post collecting telemetry from across an organization's IT infrastructure, including networks, devices, appliances, and data stores, regardless of where such assets are located. Essentially, the SOC is the point of contact for any events logged within the organization that is being monitored. The SOC must decide how each event will be managed and handled"-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Home library Call number Status Date due Barcode Item holds
EBOOK EBOOK COLLEGE LIBRARY
COLLEGE LIBRARY
005.8068 B295 2024 (Browse shelf) Available (In Process)
Total holds: 0

Includes bibliographical references and index.

"The Security Operation Center (SOC) is a centralized function within an organization that uses people, procedures, and technology to prevent, identify, analyze, and respond to cybersecurity incidents while continuously monitoring and improving an organization's security posture. The emergence of sophisticated threats placed a premium on gathering context from several sources. An SOC is a central command post collecting telemetry from across an organization's IT infrastructure, including networks, devices, appliances, and data stores, regardless of where such assets are located. Essentially, the SOC is the point of contact for any events logged within the organization that is being monitored. The SOC must decide how each event will be managed and handled"-- Provided by publisher.

There are no comments for this item.

to post a comment.