Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.
Cyber Security Risk Analysis: Proposal Essay
Security Operation Center
A security operations center ( SOC) includes the people, processes, and technologies responsible for monitoring, analyzing, and maintaining an organization’s information security.
The infrastructure of the Security Operation Center
The security operation Centre has the following infrastructure
A) Software
- Intrusion detection software and intrusion prevention
- Firewalls
- Vulnerability Scanners
- SIEM
B) Hardware
- Firewalls
- Behavioral monitors
- Asset Discovery
The proposal complies with the ISOIEC 27001:2013 which specifies the requirements for establishing, implementing, maintaining, and continually improving an information security management system within the context of an organization. It also includes requirements for assessments and treating information security risks.
Tasks of the security operation center
- 24×7 monitoring of IT security alerts, incidents, and issues
- Supported by our 24×7 TukTuk Ev security operation center
- Anti-spoofing configuration and protection
- Cyber threats intelligence management
- Cyber security incident response team
Responsibility of the Security Operation Centre
The security operation center has the following responsibilities:
- Alert investigation– a tier 1 analyst is based on this stage and monitors security information and event management( SIEM) alerts and also manages and configures security monitoring tools. Threats are arranged according to priority and perform an inspection to confirm security incidents happening.
- Incidence response– this is the duty of a tier 2 analyst who receives incidents and conducts deep analysis and relates with threat intelligence to identify the security breach and the nature of the attack and how the system or data is affected. The analyst decides on remediation and recovery
- Threat Hunting – tier 3 analyst is responsible for day-to-day vulnerability assessments and penetration tests, review alerts, industrial news threat intelligence, and security data. Hunts for threats on the network and also joins tier 2 analysts into containing it.
Organization of security operation center
- Organization of the Soc Monitor
TTEV security operation center integrates with your information systems, monitoring the systems 24x7x365 in real time for cyber alerts, incidents, and issues. The SOC services provide analysis and report for all the cyber activities detected.
- Analyze
TTEV’s Security Operation Center automates the analysis of all the event logs. With an all-time updated cyber threats database analysis discards possible threats before execution.
- Response
From the deep analytics of the event logs cyber threats are identified early and our team of certified ex-parts is quick to respond to an attack in time
- Organization
TTEV’s Security operation center as a service organization of services it provides is categorized into three: monitoring, analysis, and response.
- Monitoring
TTEV SOC integrates with your information system and scans all the events that take place in the assets and the network. The scanning is done in real-time and 24x7x365. The monitor keeps a record of all user activities. Our team
- Analyze
From all the events recorded by the monitor, user activities on the network, and the assets events, our team performs an automated analysis of all the events. The analysis help identifies possible threats and malicious activities. With an all-time updated cyber threats database analysis discards possible threats before execution.
- Response
Our team has certified cybersecurity experts with great expertise and experience. In the event of an attack, they are efficient in response to counter and mitigate the attacks. The team can perform a thorough risk analysis, identify cyber gaps and provide suitable remedies. The team will develop and implement policies to address vulnerabilities. Our experts will develop and provide a recovery plan and a business continuity plan in case a cyber-security attack is successful.
Responsibilities
Security team
- Security analyst –responds to incidents first. They are responsible for developing and deploying policies to manage system users’ functions. The security analyst’s responses are either threat detection, investigation, or addressing the threats.
- Security architects – they develop the security architecture. They select and maintain analysis tools to monitor security. They create tools and procedures to prevent and counter cyber threats. They develop protocols to be followed in case of an attack.
- Security Operation Center Manager – manages the operations of the security team. The manager oversees the activities including training staff, hiring, and assessing their performance. The manager is obligated to ensure that the security procedure put up is incompliant with the laws and rules governing computer use and security.
The security operation center has the following responsibilities:
- Alert investigation– a tier 1 analyst is based on this stage and monitors security information and event management (SIEM) alerts and also manages and configures security monitoring tools. Threats are arranged according to priority and perform an inspection to confirm security incidents happening.
- Incidence response– this is the duty of a tier 2 analyst who receives incidents and conducts deep analysis and relates with threat intelligence to identify the security breaches and the nature of the attack and how the system or data is affected. The analyst decides on remediation and recovery
- Threat Hunting – tier 3 analyst is responsible for the day-to-day vulnerability assessments and penetration tests, review alerts, industrial news threat intelligence, and security data. Hunts for threats on the network and also join tier 2 analysts in containing them.
Tasks and benefits
TTEV’s Security operation center provides real-time 24×7 monitoring and scanning of the assets and the network.
TTEV provides anti-spoofing protocols that protect privileged information from unauthorized persons. Filters will be applied in the access points to your firms to ensure that unauthorized persons do not identify as trusted sources. Firewalls used by the TTEV security operation center have filters to eliminate false sources.
A ready-response team to counter and mitigate attacks. The security team is dedicated to observing cyber events and countering them. The cyber team is divided into its teams and has a protocol to be executed in case of a cyber event. With the protocol threats can be identified and eliminated before it is propagated, an ongoing attack can be countered and mitigated and in case an attack is successful the team has raided out procedures to recover the information system to its working condition.
Cyber security experts for consolation and cyber-security advice. Cyber security experts can help your firm when you wish to consult an issue concerning security. The team offers advice on issues.
The cyber security team develops customized rules and policies for your firm. This will ensure optimal security by governing people’s activities that make the system vulnerable to cyber-attacks.
The infrastructure of the security operation center Software
Firewall – the TTEV Security operation center uses firewalls to ensure that known threats are discarded before they enter the network from the internet. The threats database is customized and regularly updated with new threats to secure the system.
Intrusion detection and intrusion prevention software – the software is placed behind firewalls. Intrusion detectors identify anomalies in the events of a network. They communicate with the security team in case of abnormal activities. Intrusion prevention software discards and eliminated abnormal activities being done on the network.
Security information and event management – TTEV uses powerful SIEM that collect and analysis all systems events and logs from assets, information system, and the network.
Vulnerability scanners – TTEV has put in place vulnerability scanners. This ensures that all vulnerabilities in the system are identified. This helps in preventing the exploitation of the vulnerability or putting up measures to counter the attack when the vulnerability is exploited.
Hardware
- Behavioral monitors – TTEV has behavioral monitors that observe the activities of given people. This gives the security team information on the activities and therefore makes incites on how to handle future similar activities.
- Firewalls – TTEV security operation center will place firewalls at the access points. This will prevent threats from the internet including malware.
- Asset discovery – this identifies all the assets in a firm. With all assets identified risk analysis and identify the vulnerability.
References
- Khalili, M. (2015). Monitoring and improving managed security services inside a security operation center (Doctoral dissertation, Concordia University).
- Katowitz, M. (2018). Third-Party Managed Security Service Provider [Guest Blog]| IS Partners. Ott, J. L. (2001). Managed Security Services. Inf. Secure. J. A Glob. Perspect., 10(4), 1-3.
- Jansen, C. (2017). Stabilizing the industrial system: Managed security services’ contribution to cyber-peace. IFAC-PapersOnLine, 50(1), 5155-5160.
Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.