Critical Review: Trends Driving Security Operation Centers in Business
VerifiedAdded on 2023/06/11
|6
|1005
|295
Literature Review
AI Summary
This document presents a student's review of the article "Driving Security Operation Centers" published in Security Journal. The review summarizes the article's main idea, which focuses on the alignment of business objectives with cybersecurity measures. It highlights key information presented in the article, including the impact of cyber threats, the overview of security operation centers (SOCs), the collaboration between businesses and SOCs, the role of security teams, and the challenges they face. The review then provides a response to the article, emphasizing the importance of technology in modern business, the impact of regulations on technology security, and the establishment of SOCs for threat monitoring and response. It also discusses the need for coordination between security teams and business operators and addresses the challenges faced by security teams in acquiring skilled personnel. The review concludes by stressing the importance of a strong relationship between business enterprises and security teams to protect customer data and digital assets.

Running head: OPERATION SECURITY
1
1
Operations security
Name
Institutions
Professor
Course
Date
1
1
Operations security
Name
Institutions
Professor
Course
Date
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2
OPERATION SECURITY
Title of the article: Security Journal
Topic: Driving security operation centers.
Author: Tom Gilheany
Publisher: Security Operations Center (SOC).
Date of publication: March 22, 2018.
Link to Article: https://www.securitymagazine.com/articles/88828-trends-driving-security-
operations-centers
Main idea of the Article:
Business objectives in correspondence to cyber threats
Information Presented:
1. Impact of cyber threats to business
2. Security operations centers overview
3. Collaboration of business with security operation centers.
4. Role of security teams in response to business objectives.
5. Challenges facing business security teams.
Response to the journal:
According to the journal, business and technology are key essentials of development
nowadays. In Collaboration with each other has led to the realization of dynamical changes in the
fields of business. For the business to thrive effectively has to depend on technological features
OPERATION SECURITY
Title of the article: Security Journal
Topic: Driving security operation centers.
Author: Tom Gilheany
Publisher: Security Operations Center (SOC).
Date of publication: March 22, 2018.
Link to Article: https://www.securitymagazine.com/articles/88828-trends-driving-security-
operations-centers
Main idea of the Article:
Business objectives in correspondence to cyber threats
Information Presented:
1. Impact of cyber threats to business
2. Security operations centers overview
3. Collaboration of business with security operation centers.
4. Role of security teams in response to business objectives.
5. Challenges facing business security teams.
Response to the journal:
According to the journal, business and technology are key essentials of development
nowadays. In Collaboration with each other has led to the realization of dynamical changes in the
fields of business. For the business to thrive effectively has to depend on technological features

3
OPERATION SECURITY
to carry out its operations efficiently and in fast mode. Large amount data and digital assets held
in business organizations are in great threat of cybercrimes if business organizations do not
involve themselves with technology hence businesses working hand in hand with technology
systems to secure their data and digitalized assets.
Regulations in technology environment have led to a positive impact in business-oriented
organizations. It has simplified functions of operations building a rigid confidence in between the
customers and business operators by promoting security in customer data, intellectual property,
and other related digitalized assets. The cyber threat is the major aspect which has resulted in
critical regulations in technology security systems to get rid of network breaches damaging and
secure organization systems from the effects of cybercrime. However, due to technological
advances strong system strategies have been set in place to monitor and detect any threat from
any crime field from being executed in business or organization systems to violate and
manipulate any important data.
Some of the technology supportive aspects of regulations which have been set includes
the establishment of security operations centers (SOC) for the purpose of providing security
services to all business departments through monitoring, detection, investigation and real-time
response to cyber threats. Through security operation centers business enterprises will achieve
their goals of a standard such as integrity in brands, protected personal data and secured
operating systems through the responsibility of SOCs in assessing and defending cyber spam
messages and attacks.
OPERATION SECURITY
to carry out its operations efficiently and in fast mode. Large amount data and digital assets held
in business organizations are in great threat of cybercrimes if business organizations do not
involve themselves with technology hence businesses working hand in hand with technology
systems to secure their data and digitalized assets.
Regulations in technology environment have led to a positive impact in business-oriented
organizations. It has simplified functions of operations building a rigid confidence in between the
customers and business operators by promoting security in customer data, intellectual property,
and other related digitalized assets. The cyber threat is the major aspect which has resulted in
critical regulations in technology security systems to get rid of network breaches damaging and
secure organization systems from the effects of cybercrime. However, due to technological
advances strong system strategies have been set in place to monitor and detect any threat from
any crime field from being executed in business or organization systems to violate and
manipulate any important data.
Some of the technology supportive aspects of regulations which have been set includes
the establishment of security operations centers (SOC) for the purpose of providing security
services to all business departments through monitoring, detection, investigation and real-time
response to cyber threats. Through security operation centers business enterprises will achieve
their goals of a standard such as integrity in brands, protected personal data and secured
operating systems through the responsibility of SOCs in assessing and defending cyber spam
messages and attacks.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

4
OPERATION SECURITY
Business primary needs are resulting in the massive emergency of this security operation centers
nowadays and even in future. All business enterprises require an established conducive
environment essentially for collaboration in operation departments to run all processes in real
time and control all problems in immediate effect. Also, business operators and cyber security
equipment must work in relation to each other and information technology functions to achieve
high business aims and efficiency in operations (Johnson, 2013). Co-ordination in
communication between the security team and business enterprise operators centralizes all
business operations and promotes secure running of business events (Laudon, Traver, & Pearson,
2018). In addition, due for the purpose detecting and fixing problems any time they occur
businesses have to rely on holistic view supported by the security operation centers for
centralized immediate protection of its digital assets.
In order this security centers to achieve business objectives, its security team has to work
together to support businesses operations running efficiency and security through automated
security programs. Each security team member in the security centers is assigned the individual
duty to ensure total real-time surveillance of business activities as listed below.
Security operation center management and compliance controlling through budgeting and
legalization.
Response to cybercrimes through investigation and evaluation.
Analyzing in examination, gathering, and preservation of evidence.
Analysis of information system through identification of business events using cyber
defense tools.
OPERATION SECURITY
Business primary needs are resulting in the massive emergency of this security operation centers
nowadays and even in future. All business enterprises require an established conducive
environment essentially for collaboration in operation departments to run all processes in real
time and control all problems in immediate effect. Also, business operators and cyber security
equipment must work in relation to each other and information technology functions to achieve
high business aims and efficiency in operations (Johnson, 2013). Co-ordination in
communication between the security team and business enterprise operators centralizes all
business operations and promotes secure running of business events (Laudon, Traver, & Pearson,
2018). In addition, due for the purpose detecting and fixing problems any time they occur
businesses have to rely on holistic view supported by the security operation centers for
centralized immediate protection of its digital assets.
In order this security centers to achieve business objectives, its security team has to work
together to support businesses operations running efficiency and security through automated
security programs. Each security team member in the security centers is assigned the individual
duty to ensure total real-time surveillance of business activities as listed below.
Security operation center management and compliance controlling through budgeting and
legalization.
Response to cybercrimes through investigation and evaluation.
Analyzing in examination, gathering, and preservation of evidence.
Analysis of information system through identification of business events using cyber
defense tools.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

5
OPERATION SECURITY
However, for the security centers to achieve its goals in response to the above skills in order to
achieve business data and other attributes security in return it requires high skilled personnel
which is a challenge facing security team for the time being due emergency of advanced cyber
threats though in order to get rid of lacking enough skills personnel’s with high skills are
teaching their security colleague members and validating their skills to meet the need of
emerging business enterprises and build strong confidence with their customer through the power
of security operation centers (Grant-Adamson, 2017).
Conclusion
Business enterprise individuals have to establish a strong relationship with security teams
for the security services of their customers' data, digital assets, and other intellectual properties
through secure threat surveillance and real-time protection by the deployment of internet
protocol cameras, drones and artificial bits of intelligence.
OPERATION SECURITY
However, for the security centers to achieve its goals in response to the above skills in order to
achieve business data and other attributes security in return it requires high skilled personnel
which is a challenge facing security team for the time being due emergency of advanced cyber
threats though in order to get rid of lacking enough skills personnel’s with high skills are
teaching their security colleague members and validating their skills to meet the need of
emerging business enterprises and build strong confidence with their customer through the power
of security operation centers (Grant-Adamson, 2017).
Conclusion
Business enterprise individuals have to establish a strong relationship with security teams
for the security services of their customers' data, digital assets, and other intellectual properties
through secure threat surveillance and real-time protection by the deployment of internet
protocol cameras, drones and artificial bits of intelligence.

6
OPERATION SECURITY
References
Grant-Adamnson, A. (2017). C yber Crime. Mason Crest.
Johnson, M. (2016). Cyber Crime, Security and Digital Intelligence. London: Routledge.
Laudon, K. C., Traver, C. G., & Pearson. (2018). E-commerce: Business, technology, society.
Boston: Boston [etc.] : Pearson, 2018.
states, U. (2015). Small business, big threat: Protecting small businesses from cyber attacks :
hearing before the Committee on Small Business, United States House of Representatives, One
Hundred Fourteenth Congress, first session, hearing held April 22, 2015. Washington:
Washington : U.S. Government Publishing Office, Washington, DC : For sale by the
Superintendent of Documents, U.S. Government Publishing Office 2015.
OPERATION SECURITY
References
Grant-Adamnson, A. (2017). C yber Crime. Mason Crest.
Johnson, M. (2016). Cyber Crime, Security and Digital Intelligence. London: Routledge.
Laudon, K. C., Traver, C. G., & Pearson. (2018). E-commerce: Business, technology, society.
Boston: Boston [etc.] : Pearson, 2018.
states, U. (2015). Small business, big threat: Protecting small businesses from cyber attacks :
hearing before the Committee on Small Business, United States House of Representatives, One
Hundred Fourteenth Congress, first session, hearing held April 22, 2015. Washington:
Washington : U.S. Government Publishing Office, Washington, DC : For sale by the
Superintendent of Documents, U.S. Government Publishing Office 2015.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





