Skip to main content
WorldCist'17 - 5th World Conference on Information Systems and Technologies

Full Program »

SOC- and SIC-based Information Security Monitoring

New numerous and sophisticated attacks make organizations’ IT infrastructure (ITI) break-in more professional and dangerously effective. The organizations must oppose this properly designed and centralized information security (IS) incident management system. Learn from the past helps to avoid the consequences of serious IS incidents in the future. Therefore, IS monitoring is necessary for rapidly detecting IS incidents, minimizing loss and destruction, mitigating the vulnerabilities exploited and restoring organization’s ITI. This process can be implemented based on Security Operations Centers and Security Intelligence Centers as their next evolution step. SOCs’ main functions and se-rious limitations are defined. The SICs’ concept and functioning are analyzed. Further research area concludes the paper.

Author(s):

Natalia Miloslavskaya    
National Research Nuclear University MEPhI (Moscow Engineering Physics Institute)
Russia

 

Powered by OpenConf®
Copyright ©2002-2016 Zakon Group LLC