{"title":"开发共享SOC","authors":"Martin Walsham","doi":"10.12968/s1361-3723(23)70019-5","DOIUrl":null,"url":null,"abstract":"A security operations centre (SOC) provides a critical security function to detect and defend from cyber security attacks. It is the last line of defence as part of an organisation's overall security control set. But not every organisation can, or should, run its own SOC.","PeriodicalId":35636,"journal":{"name":"Computer Fraud and Security","volume":"49 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Developing a shared SOC\",\"authors\":\"Martin Walsham\",\"doi\":\"10.12968/s1361-3723(23)70019-5\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A security operations centre (SOC) provides a critical security function to detect and defend from cyber security attacks. It is the last line of defence as part of an organisation's overall security control set. But not every organisation can, or should, run its own SOC.\",\"PeriodicalId\":35636,\"journal\":{\"name\":\"Computer Fraud and Security\",\"volume\":\"49 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Fraud and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12968/s1361-3723(23)70019-5\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"Social Sciences\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Fraud and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1361-3723(23)70019-5","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"Social Sciences","Score":null,"Total":0}
A security operations centre (SOC) provides a critical security function to detect and defend from cyber security attacks. It is the last line of defence as part of an organisation's overall security control set. But not every organisation can, or should, run its own SOC.
期刊介绍:
Computer Fraud & Security has grown with the fast-moving information technology industry and has earned a reputation for editorial excellence with IT security practitioners around the world. Every month Computer Fraud & Security enables you to see the threats to your IT systems before they become a problem. It focuses on providing practical, usable information to effectively manage and control computer and information security within commercial organizations.