We all are very familiar with the cyber threats around us and these are Rapidly increasing day by day. So to Protect the Organization from hackers.
Nowadays, Security Operation Center (SOC) is opened to Defending these threats in Formalized, Disciplined approach like a Professional. These Centers provide many services to protect the firm from cyber attacks by Monitoring, managing, and hosting security to a firm these Services are also customized according to the Organizations. Big Companies nowadays establishing their own SOCs but for small organizations They give contracts to SOCs to manage their security.
What kind of attacks are these and who the people these are?
All these people includes Threat Actors: Threat Actors includes Amateurs, Hacktivist.
Threat Actors perform cyberattacks against each other or Organization for Financial gain or sometimes as social work but still attack without permission is termed as Crime.
Let us see who are these Amateurs, Hacktivist.
- Amateurs –
These are the people with no skills or little skills in the cyber domain. They use the already existing tools and instructions on the internet to launch attacks. Sometimes they do for there Curious and sometimes to show off their skills. yes they are using simple/basic tools but still the results may be devastating. As these people are with fewer skills so they are also named as Script Kiddies.
- Hacktivist –
Hacktivist are the people who are against some political issue , social ideas. They publicly protest against the government or Organization by posting photos, videos, or leaking the confidential data, and sometimes they disrupting web services with illegitimate traffic in distributed denial of service (DDoS) attacks.
Jobs in SOCs :
There are job levels in SOCs and these are as follows: Alert Analyst, Incident Responder, Subject Matter Expert(SME)/ HUNTER, and SOC Manager. These are explained as following below.
- Alert Analyst –
Monitor incoming alerts, verify that a true incident has occurred, and forward tickets to Incident Responder if necessary.
1. Monitoring Incident 2. Opens Ticket 3. Basic Threat Mitigation
- Incident Responder –
Deep investigation of incidents and advise remediation.
1. Deep Investigation 2. Advises Remediation
- SME/HUNTER –
These professionals are highly in their particular field like SME(Threat Intel) , SME(Network) , SME(Malware) , SME(Endpoint). They are highly skilled in hunting potential threats and implementing the tools.
1. In depth knowdledge 2. Threat Hunting 3. Preventive measures
- SOC Manager –
This professional manages all the resources of the SOC and serves as the point of contact for the larger organization or customer.
Technologies in SOCs :
SOC needs a security information and event management system (SIEM). This system Combines data from multiple technologies. SIEM systems are used for collecting and filtering data, detecting and classifying threats, analyzing and investigating threats, and managing resources to implement preventive measures and address future threats.
SOC Technologies is/are-
- Event collection, correlation, and analysis
- Security monitoring
- Security control
- Log management
- Vulnerability assessment
- Vulnerability tracking
- Threat intelligence
Don’t stop now and take your learning to the next level. Learn all the important concepts of Data Structures and Algorithms with the help of the most trusted course: DSA Self Paced. Become industry ready at a student-friendly price.
- Difference between Cyber Security and Information Security
- Difference between Information Security and Network Security
- Difference between Network Security and Cyber Security
- Principal of Information System Security : Security System Development Life Cycle
- Security of RSA
- What is Information Security?
- Need Of Information Security
- Is SSL enough for Cloud Security?
- Wireless Security | Set 1
- System Security
- Network Security
- Data Security
- API Keys and their security
- IP security (IPSec)
- Wireless Security | Part 2
- Computer Security and its Challenges
- Transport Layer Security (TLS)
- Information Security | Integrity
- Information System and Security
- Threats to Information Security
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.