logo
Wrong email address or username
Wrong email address or username
Incorrect verification code
back to top
Search tags: multiple-pov
Load new posts () and activity
Like Reblog Comment
text 2018-09-21 06:38
Know About SOC (Security Operations Center) and the Rise of SIS (Security Insight Services)

What is SOC?

SOC i.e., Security Operations Center is that army which protects you from the terrorists named as cyber-attacks and online threats. Having said that, it resembles the 24/7 hardworking forces dedicated to preventing, detecting, assessing, and responding to the cyber threats and vulnerabilities. The team is highly skilled and organized with the mission of continuously monitoring and improving the security posture of an organization.

 

The Strategy of SOC

 

The SOC strategy has to be business-specific and clearly outlined. It strictly depends upon the support and sponsorship of executive levels otherwise it’s not possible for SOC to work properly. The SOC must be an asset to the rest of the organization. The aim of SOC should be catering to the company’s needs and a strong sponsorship from the executives is mandatory to make it successful.

 

The Infrastructure

 

Careful planning is the key to make any model successful. Same is the case with the SOC environment design. The aspects like physical security, layout, and electrical arrangements for the equipment, lighting, and acoustics must be considered properly. The SOC needs to have specific areas like a war room, an operational room, and the offices for supervisors. There must be proper visibility, comfort, control, and efficiency in every single area and therefore the design should be in consideration with these aspects.

 

The Technological Environment

 

After the mission and scope of the SOC, designing the underlying infrastructure is important. As several components are mandatory to build a comprehensive technological environment like firewalls, breach detection solutions, IPSs/IDSs, probes, and SIEM of course, to name a few. Efficient and effective data collection is primarily essential for a perfect SOC. Packet captures, telemetry, data flows, Syslog, and many such events are vital to collect, correlate, and analyze from the perspective of security. It is also essential to monitor the information and data about the vulnerabilities which can affect the complete ecosystem.

The Team and Processes

 

Although, technical aspects are highly important, still the huge and high-tech control room would be worthless if it doesn’t have people and proper functions/processes.

 

Just like a fully equipped car is useless without a driver, an organization is empty without human resources and policies. Technology, processes, and people are the pillars of SOC.

As we know, SOC is a Team and every winning team shall follow some rules. Apart from engineers, analysts, and dev-ops people, there will be leaders and the leadership skills are necessary for everyone. There will be several tiers assigned to different team members. The analysis based on the real event monitoring, security incident/data breach detection,

response to the incidents, and finally the remediation of those happenings. The paramount of the organization is coordination, collaboration, efficiency, and timing. Every member has to be aware of the strategy and mission of the SOC and hence, leadership plays a key role in this scenario. The SOC manager must be the one who inspires and motivates other team members so that they can contribute to the organization’s vision and mission. After all, providing 24/7 service while handling the stress isn’t easy at all.

 

Selecting such team members who can add value, is really a challenging task as the required skill-set is quite big and the enthusiasm should also be there. Again the exact amount of the workers must be hired, neither less nor more.

 

Considering this scenario, adopting a hybrid vision model could prove viable as it envisions the cooperation between the internal teams and managed service providers which are outsourced.

 

The Types of SOC models

 

Are you aware that there are several kinds of SOC models? Yes, check out below-

 

Virtual SOC

 

• It has no dedicated solution/facility

• Members are part-time

• The team is active only when critical incidents occur

 

Dedicated SOC

 

• Facility is dedicated

• The team is also dedicated

• Totally in-house team

 

Co-managed / Distributed SOC

 

• Both semi-dedicated and dedicated teams

• Usually, 5 X 8 operations are handled

• It becomes co-managed when paired with MSSP (Managed Security Service Provider)

 

Command SOC

 

• Coordination with other SOCs

• Offers situational awareness, threat intelligence, and additional expertise

• Not always directly involved in day-to-day operations but rarely

 

NOC (Network Operations Center) / Multifunction SOC

 

• Dedicated facility and team

• Performs all critical IT and security operations 24/7 with common facilities

• Helps in reducing the costs of the organization

Fusion SOC

 

One SOC facility consists of new and traditional SOC functions like CIRT (Computer Incident Response Team), threat intelligence, and OT (Operational Technology) functions which are combined.

 

Fully Outsourced SOC

 

Apart from the above six models, the service provider of ‘fully outsourced model’ operates and builds the SOC with minimum but supervisory involvement from the customer’s enterprise.

 

The Intelligence and Approach

 

To enhance the organization’s security posture, the SOC has to be both –active and proactive as it needs to carry out the process of Vulnerability Management. The priority for SOC is a robust approach to handling vulnerability and risk assessment skill. Other than that the OWASP model approach can be taken into the consideration too. Also, a threat intelligence approach (context aware) shall be implemented to become more effective in diagnosing/preventing the threats and adding more value.

 

The Essentials

 

Creating and Operating a SOC demands high quality, infrastructure, enthusiasm, teamwork, and skills. It should have best practices, compliances, and frameworks like COBIT, ITIL, and other are vital to abide by the PCI DSS and ISO/IEC 27001: 2013 standards.

ITIL is a potentially unmatched source of guidance in case of service design and strategy, service level management, and coordinating between the SOC related purposes and incident management processes.

 

Also, COBIT and especially its Maturity Model, COBIT- MM shall be considered as a premium guideline for checking how mature is SOC?

 

The performance of the SOC has to be measured correctly and appropriately in all aspects. Therefore, the KPIs must be well-defined to check the application of ITIL, i.e., continual improvement of service. These steps will help in generating the best results from the SOC and add value to the organization.

 

So, these were the things you need to know about SOC.

 

Now, let’s understand what are Managed Security Services or Security Insight Services.

SIS (Security Insight Services)

 

We all know the hell number of online threats and cyber-attacks going on in the world. These things happen due to lack of essential security tools, equipment, and services. Many of the businesses are so concerned about the security of their data and loss of business but they don’t get proper solutions. They are often worried about how prepared their organization is to handle the online crisis situations.

 

To these problems, ‘Security Insight Services’ is the solution. It is a one-stop-shop solution for all the current and possible online threats/attacks.

 

The offerings by SIS

 

• Project driven approach

• Security Incident & Threat Analysis

• Project Driven Approach

• Security posturing assessment

• Security Incident & Threat Analysis

• Gap Analysis

• Network Security Assessment

• Malware Threat Modeling

• Database Activity monitoring & Vulnerability Scanning

• SIEM effectiveness modeling Configuration Auditing

• Process Auditing

• Application Vulnerability Assessment Email System Assessment

• Wireless System Assessment

• DDOS Attack Preparedness Testing DLP Analysis

 

The Need for SOC and SIS

 

If you aren’t aware already then let me tell you that if an attack happens, it takes 99 days on an average for that to get identified. Now that’s a big amount of time! So, you get the need for data protection and privacy for providing security. Hence, it clearly indicates the dire need for newness in the technology of cyber-security. Many people forget that just having the correct tools and processes isn’t enough. You can be still vulnerable to threats and attacks if you don’t monitor systems, detect upcoming threats, and don’t make any changes in the systems/operations whenever an attack or threat is identified.

 

Many organizations are now getting aware and want to build their SOC as they want more control over the safety of their data, monitoring, and the response. A SOC built project creates a strategic business impact and hence it’s a critical and vital initiative for those organizations.

 

Conclusion

 

Looking at all the above key pointers, we get to know about the ideal SOC, the necessities for it in all aspects, the rise of SIS (Security Insight Services), and the vitality of SOC and SIS. To run ta SOC, the comprehensive range of cyber security aspects, high skills, and important competencies have to be considered. Building SOC is a combination of business strategies and high level of security armors as a service.

 

Teamwork, great leadership skill, and motivation are vital for every member of the team, especially for the manager. A fully functional SOC is a complex project because it has to deal with wide and endless range or problems related to the data security. As the time gets ahead, there are going to be more challenges, and therefore a SOC has to be prepared for the same.

 

There is going to be the constant need for high-end online security services, and everyone has to brace for it! SOC team has a lot of work to do and that too tirelessly.

Many businesses will have to choose one of the best online security services or the SOCs, and we are certainly going to get a number of them in the near future.



So, the whole point is that every single business should find a great SOC to cater to their needs of business security and improve the complete security structure of the organization.

Like Reblog Comment
show activity (+)
review 2018-09-10 16:48
Cartoony science fiction/fantasy comic collection - reasonably fun but..
Complete Multiple Warheads TP - Brandon S Graham

.

 

This collection deals with two main female protagonists in parallel stories: they both are involved with powered organs, smuggling or capturing. There’s a huge amount of strange creatures and few humanoid beings. The artwork is simple, colourful, detailed and a little weird. The stories are reasonably interesting and packed with puns, some of which I skipped or didn’t spot, many of which require a wide knowledge. Plenty of sex and bloodless violence. Enjoyable enough but I didn’t like it enough to bother with Volume 2.

 

Like Reblog Comment
review 2018-09-09 21:20
Where the Sidewalk Ends - Shel Silverstein

This is a book of funny and cute poems for children. It is a great introduction to poems. 

In my classroom I would use this to get students interested in poems. As part of a lesson I would let students write poems using this book as an example. 

Lexile Level: NA

Like Reblog Comment
show activity (+)
review 2018-08-24 16:01
Booster Pack: Book Edition
Comics Squad: Recess! - Jennifer Holm,Matthew Holm,Jarrett J. Krosoczka,Dan Santat

Last year around this same time I fell into a bit of a reading slump (yes, it happens to everyone) and I picked up a little comics selection called Comics Squad: Detention hoping that it would revive me. I'm happy to say that it did the trick. Thinking lightning might strike twice, I delved into Comics Squad: Recess! by Jennifer L. Holm, Jarrett J. Krosoczka, Dan Santat, & Raina Telgemeier which is another book from this collection. This book explores the theme of recess with the authors/illustrators charged with coming up with stories which somehow incorporated this theme. (Some accomplished this feat more successfully than others as a few barely mentioned recess at all.) I especially enjoyed the last 2 stories both visually and from a narrative standpoint. (If you're curious, the two stories are "300 Words" by Dan Santat which was a love story and "The Rainy Day Monitor" by Raina Telgemeier & Dave Roman which was about a RPG kickball game.) I like recommending this series to burgeoning graphic novel/comics fans since it contains a variety of storytelling and art styles to give them a better idea of what they might like. This is a great idea for anyone, regardless of age, who might be interested in sampling different writers and illustrators. 8/10 overall and certainly wouldn't say no to reading more from this series (or from the two artists mentioned).

 

From Dan Santat's "300 Words" [Source: Santat's Twitter]

 

From "The Rainy Day Monitor" [Source: Graphic Novel Resources]

 

 

What's Up Next: CatStronauts: Space Station Situation CatStronauts: Robot Rescue by Drew Brockington

 

What I'm Currently Reading: El Deafo by Cece Bell

Source: readingfortheheckofit.blogspot.com
Like Reblog Comment
show activity (+)
review 2018-06-24 21:58
Lying in Wait by Liz Nugent
Lying in Wait - Liz Nugent

This takes place primarily in the 1980s, in Ireland. On the surface, Lydia, her husband Andrew, and her son Laurence appear to have a perfect life. The whole family lives in Lydia's family home, a beautiful mansion. Lydia is a stay-at-home mom who is devoted (overly so) to her son, and Andrew is a respected judge.

This happy life is a facade. Andrew and Lydia hired Annie, a prostitute, to help them with a problem, and when Annie tried to blackmail Andrew he choked her and Lydia finished her off. Lydia proposed that they bury Annie in their garden, a perfectly safe spot since of course they'd never sell off her family home. Unfortunately, the family also has money problems, brought on by Andrew placing his trust in the wrong accountant. Cracks are beginning to appear in their pretty little life, and those cracks widen when Laurence sees news reports about Annie and begins to suspect that his father had something to do with her disappearance.

I picked up an ARC of this during a recent conference. Although it's been out since 2016, it looks like it was released in hardcover earlier this month.

I read this hoping for an exciting and tense thriller. What I got was sometimes achingly slow pacing, characters I didn't care much about, and boredom. I thought this would be about Lydia and Andrew's increasingly futile efforts to hide their part in Annie's murder. I suppose there was a little bit of that, but the story mostly turned out to be about Lydia and her deeply unhealthy attachment to her son (no incest, but there were a couple moments when I worried that that was where Nugent was going with all of this). Everyone's secrets poisoned everything around them, and the ending was just depressing.

There is no justice and goodness to be found here.

(spoiler show)


The book alternated between chapters from Lydia, Laurence, and Karen's POVs. Karen was Annie's sister, and probably the most sympathetic of the book's more prominent characters. Although I disliked her actions where Bridget was concerned, I wanted things to work out well for her.

Too bad this wasn't that kind of story.

(spoiler show)


I felt some sympathy for Laurence, who was clearly being suffocated by his mother, but that sympathy eventually evaporated. He was more like his father than his mother - he actually had a bit of a conscience, but it didn't stop him from doing horrible things and then finding ways to rationalize most of it later. I completely gave up on him when I got to the chapter from his POV about the first time he met Karen. This took place a lot later than the publisher's description led me to believe it would, by the way.

The bulk of the book was pretty boring. Despite the fact that Andrew made several enormous mistakes, he and Lydia didn't have to work nearly as hard to hide their tracks as I'd have expected. As time passed (the story took place over the course of about 6 years, I think), it seemed less and less likely that the mystery of Annie's disappearance would ever be solved. The story finally became more tense and interesting near the end, as everyone's lies started to unravel. Unfortunately, the ending was a disappointment.

I'll end this with a warning for readers for whom weight and weight loss in fiction are an issue. At the start of the book, Laurence is fat and bullied because of his weight. Throughout the rest of the story his weigh yo-yos. The descriptions of his weight loss bothered me - he struggled with a relentless appetite, but that appetite had a tendency to magically disappear after he started dieting, and deciding to diet also magically gave him the energy and ability to exercise.

All of this was actually addressed later on in the story, but it took a while, and until then readers had to put up with the implication that all Laurence needed to do to lose weight was exert a bit of willpower.

(spoiler show)

There were also lots of mentions of Laurence feeling repulsed by his own weight and of Laurence worrying that the women he was with were repulsed by his weight.

 

(Original review posted on A Library Girl's Familiar Diversions.)

More posts
Your Dashboard view:
Need help?