Cyber Security Risk Analysis: Proposal Essay

Topics:
Words:
1287
Pages:
3
This essay sample was donated by a student to help the academic community. Papers provided by EduBirdie writers usually outdo students' samples.

Cite this essay cite-image

Security Operation Center

A security operations center ( SOC) includes the people, processes, and technologies responsible for monitoring, analyzing, and maintaining an organization’s information security.

The infrastructure of the Security Operation Center

The security operation Centre has the following infrastructure

A) Software

  • Intrusion detection software and intrusion prevention
  • Firewalls
  • Vulnerability Scanners
  • SIEM

B) Hardware

  • Firewalls
  • Behavioral monitors
  • Asset Discovery

The proposal complies with the ISOIEC 27001:2013 which specifies the requirements for establishing, implementing, maintaining, and continually improving an information security management system within the context of an organization. It also includes requirements for assessments and treating information security risks.

Tasks of the security operation center

  • 24x7 monitoring of IT security alerts, incidents, and issues
  • Supported by our 24x7 TukTuk Ev security operation center
  • Anti-spoofing configuration and protection
  • Cyber threats intelligence management
  • Cyber security incident response team

Responsibility of the Security Operation Centre

The security operation center has the following responsibilities:

  • Alert investigation– a tier 1 analyst is based on this stage and monitors security information and event management( SIEM) alerts and also manages and configures security monitoring tools. Threats are arranged according to priority and perform an inspection to confirm security incidents happening.
  • Incidence response– this is the duty of a tier 2 analyst who receives incidents and conducts deep analysis and relates with threat intelligence to identify the security breach and the nature of the attack and how the system or data is affected. The analyst decides on remediation and recovery
  • Threat Hunting – tier 3 analyst is responsible for day-to-day vulnerability assessments and penetration tests, review alerts, industrial news threat intelligence, and security data. Hunts for threats on the network and also joins tier 2 analysts into containing it.

Organization of security operation center

  • Organization of the Soc Monitor

TTEV security operation center integrates with your information systems, monitoring the systems 24x7x365 in real time for cyber alerts, incidents, and issues. The SOC services provide analysis and report for all the cyber activities detected.

  • Analyze

TTEV’s Security Operation Center automates the analysis of all the event logs. With an all-time updated cyber threats database analysis discards possible threats before execution.

  • Response

From the deep analytics of the event logs cyber threats are identified early and our team of certified ex-parts is quick to respond to an attack in time

  • Organization

TTEV’s Security operation center as a service organization of services it provides is categorized into three: monitoring, analysis, and response.

  • Monitoring

TTEV SOC integrates with your information system and scans all the events that take place in the assets and the network. The scanning is done in real-time and 24x7x365. The monitor keeps a record of all user activities. Our team

  • Analyze

From all the events recorded by the monitor, user activities on the network, and the assets events, our team performs an automated analysis of all the events. The analysis help identifies possible threats and malicious activities. With an all-time updated cyber threats database analysis discards possible threats before execution.

Save your time!
We can take care of your essay
  • Proper editing and formatting
  • Free revision, title page, and bibliography
  • Flexible prices and money-back guarantee
Place Order
document
  • Response

Our team has certified cybersecurity experts with great expertise and experience. In the event of an attack, they are efficient in response to counter and mitigate the attacks. The team can perform a thorough risk analysis, identify cyber gaps and provide suitable remedies. The team will develop and implement policies to address vulnerabilities. Our experts will develop and provide a recovery plan and a business continuity plan in case a cyber-security attack is successful.

Responsibilities

Security team

  • Security analyst –responds to incidents first. They are responsible for developing and deploying policies to manage system users’ functions. The security analyst’s responses are either threat detection, investigation, or addressing the threats.
  • Security architects – they develop the security architecture. They select and maintain analysis tools to monitor security. They create tools and procedures to prevent and counter cyber threats. They develop protocols to be followed in case of an attack.
  • Security Operation Center Manager – manages the operations of the security team. The manager oversees the activities including training staff, hiring, and assessing their performance. The manager is obligated to ensure that the security procedure put up is incompliant with the laws and rules governing computer use and security.

The security operation center has the following responsibilities:

  • Alert investigation– a tier 1 analyst is based on this stage and monitors security information and event management (SIEM) alerts and also manages and configures security monitoring tools. Threats are arranged according to priority and perform an inspection to confirm security incidents happening.
  • Incidence response– this is the duty of a tier 2 analyst who receives incidents and conducts deep analysis and relates with threat intelligence to identify the security breaches and the nature of the attack and how the system or data is affected. The analyst decides on remediation and recovery
  • Threat Hunting – tier 3 analyst is responsible for the day-to-day vulnerability assessments and penetration tests, review alerts, industrial news threat intelligence, and security data. Hunts for threats on the network and also join tier 2 analysts in containing them.

Tasks and benefits

TTEV’s Security operation center provides real-time 24x7 monitoring and scanning of the assets and the network.

TTEV provides anti-spoofing protocols that protect privileged information from unauthorized persons. Filters will be applied in the access points to your firms to ensure that unauthorized persons do not identify as trusted sources. Firewalls used by the TTEV security operation center have filters to eliminate false sources.

A ready-response team to counter and mitigate attacks. The security team is dedicated to observing cyber events and countering them. The cyber team is divided into its teams and has a protocol to be executed in case of a cyber event. With the protocol threats can be identified and eliminated before it is propagated, an ongoing attack can be countered and mitigated and in case an attack is successful the team has raided out procedures to recover the information system to its working condition.

Cyber security experts for consolation and cyber-security advice. Cyber security experts can help your firm when you wish to consult an issue concerning security. The team offers advice on issues.

The cyber security team develops customized rules and policies for your firm. This will ensure optimal security by governing people’s activities that make the system vulnerable to cyber-attacks.

The infrastructure of the security operation center Software

Firewall - the TTEV Security operation center uses firewalls to ensure that known threats are discarded before they enter the network from the internet. The threats database is customized and regularly updated with new threats to secure the system.

Intrusion detection and intrusion prevention software – the software is placed behind firewalls. Intrusion detectors identify anomalies in the events of a network. They communicate with the security team in case of abnormal activities. Intrusion prevention software discards and eliminated abnormal activities being done on the network.

Security information and event management – TTEV uses powerful SIEM that collect and analysis all systems events and logs from assets, information system, and the network.

Vulnerability scanners – TTEV has put in place vulnerability scanners. This ensures that all vulnerabilities in the system are identified. This helps in preventing the exploitation of the vulnerability or putting up measures to counter the attack when the vulnerability is exploited.

Hardware

  • Behavioral monitors – TTEV has behavioral monitors that observe the activities of given people. This gives the security team information on the activities and therefore makes incites on how to handle future similar activities.
  • Firewalls – TTEV security operation center will place firewalls at the access points. This will prevent threats from the internet including malware.
  • Asset discovery – this identifies all the assets in a firm. With all assets identified risk analysis and identify the vulnerability.

References

  1. Khalili, M. (2015). Monitoring and improving managed security services inside a security operation center (Doctoral dissertation, Concordia University).
  2. Katowitz, M. (2018). Third-Party Managed Security Service Provider [Guest Blog]| IS Partners. Ott, J. L. (2001). Managed Security Services. Inf. Secure. J. A Glob. Perspect., 10(4), 1-3.
  3. Jansen, C. (2017). Stabilizing the industrial system: Managed security services’ contribution to cyber-peace. IFAC-PapersOnLine, 50(1), 5155-5160.
Make sure you submit a unique essay

Our writers will provide you with an essay sample written from scratch: any topic, any deadline, any instructions.

Cite this paper

Cyber Security Risk Analysis: Proposal Essay. (2023, October 27). Edubirdie. Retrieved April 29, 2024, from https://edubirdie.com/examples/cyber-security-risk-analysis-proposal-essay/
“Cyber Security Risk Analysis: Proposal Essay.” Edubirdie, 27 Oct. 2023, edubirdie.com/examples/cyber-security-risk-analysis-proposal-essay/
Cyber Security Risk Analysis: Proposal Essay. [online]. Available at: <https://edubirdie.com/examples/cyber-security-risk-analysis-proposal-essay/> [Accessed 29 Apr. 2024].
Cyber Security Risk Analysis: Proposal Essay [Internet]. Edubirdie. 2023 Oct 27 [cited 2024 Apr 29]. Available from: https://edubirdie.com/examples/cyber-security-risk-analysis-proposal-essay/
copy

Join our 150k of happy users

  • Get original paper written according to your instructions
  • Save time for what matters most
Place an order

Fair Use Policy

EduBirdie considers academic integrity to be the essential part of the learning process and does not support any violation of the academic standards. Should you have any questions regarding our Fair Use Policy or become aware of any violations, please do not hesitate to contact us via support@edubirdie.com.

Check it out!
close
search Stuck on your essay?

We are here 24/7 to write your paper in as fast as 3 hours.