Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
Medientyp
Sprache
Region
Bibliothek
Erscheinungszeitraum
Person/Organisation
Schlagwörter
  • 1
    Online-Ressource
    Online-Ressource
    Waltham, Massachusetts :Syngress,
    UID:
    almahu_9948320714502882
    Umfang: 1 online resource (281 pages) : , illustrations (some color)
    ISBN: 9780128010969 (e-book)
    Anmerkung: Includes index.
    Weitere Ausg.: Print version: Nathans, David. Designing and building a security operations center. Waltham, Massachusetts : Syngress, c2015 ISBN 9780128008997
    Sprache: Englisch
    Schlagwort(e): Electronic books.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Waltham, Massachusetts :Syngress,
    UID:
    almahu_9948025734502882
    Umfang: 1 online resource (281 p.)
    Ausgabe: 1st edition
    ISBN: 0-12-801096-7
    Inhalt: Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and more significant every day, with many instances of companies and governments mishandling (or deliberately misusing) personal and financial data. Organizations need to be committed to defending their own assets and their customers' information. Designing and Building a Security Operations Center will show you how to develop t
    Anmerkung: Includes index. , Cover; Title Page; Copyright Page; Contents; Author Biography; Technical Editor Biography; Foreword; Acknowledgments; Chapter 1 - Efficient operations; Defining an operations center; Purpose of the operations center; Emergency operations center; Mission operations center; Threat operations center; Network operations center; Let us build a SOC!; Technology phase; Organizational phase; Policy phase; Operational phase; Intelligence phase; Plan your SOC; Logs; Event; Alerts; False positive; True positive; False negative; True negative; Incidents; Problems; Define your requirements; Summary , Chapter 2 - Identify your customersInternal versus external customers; Human resources; Legal; Audit; Engineering/R&D; IT; External customers; Customer objectives; Service level agreements; Build and document your use cases; Use case: unauthorized modification of user accounts; Stakeholders: compliance and audit departments; Use case: disabled user account reactivated; Stakeholders: HR and IT; Use case: any IDS event that scores over a severity of 7; Use case: AV failure; Stakeholders: desktop support team, IT server management teams; Use case: security device outage , Stakeholders: security and ITUse case rule summary; Use case: top vulnerabilities detected in the network; Stakeholders: security, IT, audit, and management; Use case reporting summary; Expectations; Chapter 3 - Infrastructure; Organizational infrastructure 〉 operations infrastructure 〉 support infrastructure; Organizational security infrastructure; Perimeter defenses; Network defense; Host defenses; Application defenses; Data defense; Policies and procedures; Security architecture; SIEM/log management; Operation center infrastructure; Ticketing systems; Building the ticket system; Subject , Parsed values from eventsTime ticket created; User\group\queue; Source (SIEM, email, phone); Category; Status; Reason codes; Acknowledgment/ticket feedback; Workflow and automation; Portal interface; Mobile devices; Support infrastructure; Physical; Private SOC network; Video walls; Video projectors; Labs; Chapter 4 - Organizational structure; Different reporting lines; Legal; CISO; CIO; Compliance; SOC organization; Engineering; Security architecture; Security monitoring and analysis; Responsibility; Authority; Fulfilling needs; Chapter 5 - Your most valuable resource is your people , Operational securityCulture; Personality; Core skill sets; Analysts; Security analyst-job description; Security engineering; Security operations engineer-job description; Security architect; Security architect-job description; SOC team lead; SOC team lead-job description; SOC management; SOC manager-job description; SOC games; Special projects; Do not forget your people; Chapter 6 - Daily operations; Problem and change event communications; Master station logs; Shift turn overs; Daily operations calls; Critical bridges; IR; Detection; Confirmation; Analysis; Containment; Recovery; Review , Communication plan , English
    Weitere Ausg.: ISBN 0-12-800899-7
    Weitere Ausg.: ISBN 1-322-29287-6
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    Waltham, Massachusetts :Syngress,
    UID:
    edoccha_9960073551802883
    Umfang: 1 online resource (281 p.)
    Ausgabe: 1st edition
    ISBN: 0-12-801096-7
    Inhalt: Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and more significant every day, with many instances of companies and governments mishandling (or deliberately misusing) personal and financial data. Organizations need to be committed to defending their own assets and their customers' information. Designing and Building a Security Operations Center will show you how to develop t
    Anmerkung: Includes index. , Cover; Title Page; Copyright Page; Contents; Author Biography; Technical Editor Biography; Foreword; Acknowledgments; Chapter 1 - Efficient operations; Defining an operations center; Purpose of the operations center; Emergency operations center; Mission operations center; Threat operations center; Network operations center; Let us build a SOC!; Technology phase; Organizational phase; Policy phase; Operational phase; Intelligence phase; Plan your SOC; Logs; Event; Alerts; False positive; True positive; False negative; True negative; Incidents; Problems; Define your requirements; Summary , Chapter 2 - Identify your customersInternal versus external customers; Human resources; Legal; Audit; Engineering/R&D; IT; External customers; Customer objectives; Service level agreements; Build and document your use cases; Use case: unauthorized modification of user accounts; Stakeholders: compliance and audit departments; Use case: disabled user account reactivated; Stakeholders: HR and IT; Use case: any IDS event that scores over a severity of 7; Use case: AV failure; Stakeholders: desktop support team, IT server management teams; Use case: security device outage , Stakeholders: security and ITUse case rule summary; Use case: top vulnerabilities detected in the network; Stakeholders: security, IT, audit, and management; Use case reporting summary; Expectations; Chapter 3 - Infrastructure; Organizational infrastructure 〉 operations infrastructure 〉 support infrastructure; Organizational security infrastructure; Perimeter defenses; Network defense; Host defenses; Application defenses; Data defense; Policies and procedures; Security architecture; SIEM/log management; Operation center infrastructure; Ticketing systems; Building the ticket system; Subject , Parsed values from eventsTime ticket created; User\group\queue; Source (SIEM, email, phone); Category; Status; Reason codes; Acknowledgment/ticket feedback; Workflow and automation; Portal interface; Mobile devices; Support infrastructure; Physical; Private SOC network; Video walls; Video projectors; Labs; Chapter 4 - Organizational structure; Different reporting lines; Legal; CISO; CIO; Compliance; SOC organization; Engineering; Security architecture; Security monitoring and analysis; Responsibility; Authority; Fulfilling needs; Chapter 5 - Your most valuable resource is your people , Operational securityCulture; Personality; Core skill sets; Analysts; Security analyst-job description; Security engineering; Security operations engineer-job description; Security architect; Security architect-job description; SOC team lead; SOC team lead-job description; SOC management; SOC manager-job description; SOC games; Special projects; Do not forget your people; Chapter 6 - Daily operations; Problem and change event communications; Master station logs; Shift turn overs; Daily operations calls; Critical bridges; IR; Detection; Confirmation; Analysis; Containment; Recovery; Review , Communication plan , English
    Weitere Ausg.: ISBN 0-12-800899-7
    Weitere Ausg.: ISBN 1-322-29287-6
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    Waltham, Massachusetts :Syngress,
    UID:
    edocfu_9960073551802883
    Umfang: 1 online resource (281 p.)
    Ausgabe: 1st edition
    ISBN: 0-12-801096-7
    Inhalt: Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and more significant every day, with many instances of companies and governments mishandling (or deliberately misusing) personal and financial data. Organizations need to be committed to defending their own assets and their customers' information. Designing and Building a Security Operations Center will show you how to develop t
    Anmerkung: Includes index. , Cover; Title Page; Copyright Page; Contents; Author Biography; Technical Editor Biography; Foreword; Acknowledgments; Chapter 1 - Efficient operations; Defining an operations center; Purpose of the operations center; Emergency operations center; Mission operations center; Threat operations center; Network operations center; Let us build a SOC!; Technology phase; Organizational phase; Policy phase; Operational phase; Intelligence phase; Plan your SOC; Logs; Event; Alerts; False positive; True positive; False negative; True negative; Incidents; Problems; Define your requirements; Summary , Chapter 2 - Identify your customersInternal versus external customers; Human resources; Legal; Audit; Engineering/R&D; IT; External customers; Customer objectives; Service level agreements; Build and document your use cases; Use case: unauthorized modification of user accounts; Stakeholders: compliance and audit departments; Use case: disabled user account reactivated; Stakeholders: HR and IT; Use case: any IDS event that scores over a severity of 7; Use case: AV failure; Stakeholders: desktop support team, IT server management teams; Use case: security device outage , Stakeholders: security and ITUse case rule summary; Use case: top vulnerabilities detected in the network; Stakeholders: security, IT, audit, and management; Use case reporting summary; Expectations; Chapter 3 - Infrastructure; Organizational infrastructure 〉 operations infrastructure 〉 support infrastructure; Organizational security infrastructure; Perimeter defenses; Network defense; Host defenses; Application defenses; Data defense; Policies and procedures; Security architecture; SIEM/log management; Operation center infrastructure; Ticketing systems; Building the ticket system; Subject , Parsed values from eventsTime ticket created; User\group\queue; Source (SIEM, email, phone); Category; Status; Reason codes; Acknowledgment/ticket feedback; Workflow and automation; Portal interface; Mobile devices; Support infrastructure; Physical; Private SOC network; Video walls; Video projectors; Labs; Chapter 4 - Organizational structure; Different reporting lines; Legal; CISO; CIO; Compliance; SOC organization; Engineering; Security architecture; Security monitoring and analysis; Responsibility; Authority; Fulfilling needs; Chapter 5 - Your most valuable resource is your people , Operational securityCulture; Personality; Core skill sets; Analysts; Security analyst-job description; Security engineering; Security operations engineer-job description; Security architect; Security architect-job description; SOC team lead; SOC team lead-job description; SOC management; SOC manager-job description; SOC games; Special projects; Do not forget your people; Chapter 6 - Daily operations; Problem and change event communications; Master station logs; Shift turn overs; Daily operations calls; Critical bridges; IR; Detection; Confirmation; Analysis; Containment; Recovery; Review , Communication plan , English
    Weitere Ausg.: ISBN 0-12-800899-7
    Weitere Ausg.: ISBN 1-322-29287-6
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 9780128018569?
Meinten Sie 9780128011669?
Meinten Sie 9780128013960?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz