Critical Review: Trends Driving Security Operation Centers in Business

Verified

Added on  2023/06/11

|6
|1005
|295
Literature Review
AI Summary
This document presents a student's review of the article "Driving Security Operation Centers" published in Security Journal. The review summarizes the article's main idea, which focuses on the alignment of business objectives with cybersecurity measures. It highlights key information presented in the article, including the impact of cyber threats, the overview of security operation centers (SOCs), the collaboration between businesses and SOCs, the role of security teams, and the challenges they face. The review then provides a response to the article, emphasizing the importance of technology in modern business, the impact of regulations on technology security, and the establishment of SOCs for threat monitoring and response. It also discusses the need for coordination between security teams and business operators and addresses the challenges faced by security teams in acquiring skilled personnel. The review concludes by stressing the importance of a strong relationship between business enterprises and security teams to protect customer data and digital assets.
Document Page
Running head: OPERATION SECURITY
1
1
Operations security
Name
Institutions
Professor
Course
Date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2
OPERATION SECURITY
Title of the article: Security Journal
Topic: Driving security operation centers.
Author: Tom Gilheany
Publisher: Security Operations Center (SOC).
Date of publication: March 22, 2018.
Link to Article: https://www.securitymagazine.com/articles/88828-trends-driving-security-
operations-centers
Main idea of the Article:
Business objectives in correspondence to cyber threats
Information Presented:
1. Impact of cyber threats to business
2. Security operations centers overview
3. Collaboration of business with security operation centers.
4. Role of security teams in response to business objectives.
5. Challenges facing business security teams.
Response to the journal:
According to the journal, business and technology are key essentials of development
nowadays. In Collaboration with each other has led to the realization of dynamical changes in the
fields of business. For the business to thrive effectively has to depend on technological features
Document Page
3
OPERATION SECURITY
to carry out its operations efficiently and in fast mode. Large amount data and digital assets held
in business organizations are in great threat of cybercrimes if business organizations do not
involve themselves with technology hence businesses working hand in hand with technology
systems to secure their data and digitalized assets.
Regulations in technology environment have led to a positive impact in business-oriented
organizations. It has simplified functions of operations building a rigid confidence in between the
customers and business operators by promoting security in customer data, intellectual property,
and other related digitalized assets. The cyber threat is the major aspect which has resulted in
critical regulations in technology security systems to get rid of network breaches damaging and
secure organization systems from the effects of cybercrime. However, due to technological
advances strong system strategies have been set in place to monitor and detect any threat from
any crime field from being executed in business or organization systems to violate and
manipulate any important data.
Some of the technology supportive aspects of regulations which have been set includes
the establishment of security operations centers (SOC) for the purpose of providing security
services to all business departments through monitoring, detection, investigation and real-time
response to cyber threats. Through security operation centers business enterprises will achieve
their goals of a standard such as integrity in brands, protected personal data and secured
operating systems through the responsibility of SOCs in assessing and defending cyber spam
messages and attacks.
Document Page
4
OPERATION SECURITY
Business primary needs are resulting in the massive emergency of this security operation centers
nowadays and even in future. All business enterprises require an established conducive
environment essentially for collaboration in operation departments to run all processes in real
time and control all problems in immediate effect. Also, business operators and cyber security
equipment must work in relation to each other and information technology functions to achieve
high business aims and efficiency in operations (Johnson, 2013). Co-ordination in
communication between the security team and business enterprise operators centralizes all
business operations and promotes secure running of business events (Laudon, Traver, & Pearson,
2018). In addition, due for the purpose detecting and fixing problems any time they occur
businesses have to rely on holistic view supported by the security operation centers for
centralized immediate protection of its digital assets.
In order this security centers to achieve business objectives, its security team has to work
together to support businesses operations running efficiency and security through automated
security programs. Each security team member in the security centers is assigned the individual
duty to ensure total real-time surveillance of business activities as listed below.
Security operation center management and compliance controlling through budgeting and
legalization.
Response to cybercrimes through investigation and evaluation.
Analyzing in examination, gathering, and preservation of evidence.
Analysis of information system through identification of business events using cyber
defense tools.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5
OPERATION SECURITY
However, for the security centers to achieve its goals in response to the above skills in order to
achieve business data and other attributes security in return it requires high skilled personnel
which is a challenge facing security team for the time being due emergency of advanced cyber
threats though in order to get rid of lacking enough skills personnel’s with high skills are
teaching their security colleague members and validating their skills to meet the need of
emerging business enterprises and build strong confidence with their customer through the power
of security operation centers (Grant-Adamson, 2017).
Conclusion
Business enterprise individuals have to establish a strong relationship with security teams
for the security services of their customers' data, digital assets, and other intellectual properties
through secure threat surveillance and real-time protection by the deployment of internet
protocol cameras, drones and artificial bits of intelligence.
Document Page
6
OPERATION SECURITY
References
Grant-Adamnson, A. (2017). C yber Crime. Mason Crest.
Johnson, M. (2016). Cyber Crime, Security and Digital Intelligence. London: Routledge.
Laudon, K. C., Traver, C. G., & Pearson. (2018). E-commerce: Business, technology, society.
Boston: Boston [etc.] : Pearson, 2018.
states, U. (2015). Small business, big threat: Protecting small businesses from cyber attacks :
hearing before the Committee on Small Business, United States House of Representatives, One
Hundred Fourteenth Congress, first session, hearing held April 22, 2015. Washington:
Washington : U.S. Government Publishing Office, Washington, DC : For sale by the
Superintendent of Documents, U.S. Government Publishing Office 2015.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]