Figure 19 - uploaded by Davis Mirilla
Content may be subject to copyright.
Typical SOC Workflow and How DSM Fits in (Author's Diagram)

Typical SOC Workflow and How DSM Fits in (Author's Diagram)

Similar publications

Conference Paper
Full-text available
In order to achieve a high level of cyber security awareness most mid to large sized companies use Security Information and Event Management (SIEM) embedded into a Security Operations Center. These systems enable the centralized collection and analysis of security relevant information generated by a variety of different systems, to detect advanced...
Chapter
Full-text available
Zusammenfassung Wir entwickeln in diesem Kapitel Ansatzpunkte zur Beschleunigung der digitalen Transformation: Zunächst werden Wege aufgezeigt, wie die sechs in Kap. 10.1007/978-3-658-31456-9_5 unterschiedenen Archetypen digitaler Unter-nehmen die digitale Reife erhöhen können. Dabei gilt es, konsequent die Schwachstellen zu beseitigen, die die vie...
Article
Full-text available
Color image steganography is an important task used to secure data and secrete messages, LSB2 method is one of the most popular methods used to secure data transmission by hiding a secrete data into color image. LSB2 method is very simple, efficient and has good quality factors (MSE and PSNR), but it is not secure. In this research paper we will in...

Citations

... The significance of the study was to provide cybersecurity professionals with additional knowledge on the some of the current strategies cybersecurity specialists need to improve incident response and security assessment processes to prevent long-term breaches within the cybersecurity industry. Attack detection, mitigation, and responses are significant concerns in the cybersecurity industry, firms are mainly concerned because slow action time often leads to harsh consequences like business closure, loss of investors and customer base (Mirilla, 2019). With the current changes and technological evolution, individuals, companies, and public agencies have increased their demand for online privacy, protection against attacks, and faster response time. ...
... The incident response time captures the period between an attack and a company's action or answer (Mirilla, 2019). ...
... The incident response time captures the period between an attack and a company's actions or answers to that attack (Mirilla, 2019). Although both Garcia et al. (2022) and Stevens et al. (2022) shared similar but slightly different opinions on incident response and detection, the authors both believed that firms must swiftly respond to attacks for maximum results, their opinion was that delay was dangerous, and firms must take appropriate measures to ensure a fast incident response. ...
Thesis
Full-text available
A typical cybersecurity incident involves a timeline, from attack, to threat identification, to response and then to mitigation. In today's rapidly evolving digital landscape, the realm of cybersecurity grapples with an unprecedented challenge-the relentless march of time. Within this ever-shifting landscape of cyber threats and the escalating intricacies of cyberattacks, it becomes imperative to conduct an in-depth exploration into how time exerts its influence on security timelines and strategies for countering threats within the cybersecurity industry. Most studies relate slow response times to negligence on the part of the management and staff; however, attacks at odd hours and improved cyber-attacks and hacking lead to response delays. This qualitative exploratory study explores the strategies cybersecurity specialists need to improve incident response and security assessment processes to prevent long-term breaches within the cybersecurity industry in the United States. A sample of 10 participants from across the United States completed thirteen open-ended questions via zoom interviews. The participants provided their experiences while performing cybersecurity incident response duties. The data collected was analysed and it revealed the strategies that security teams should prioritize to achieve faster and efficient incident response times. These observations are based on word expressions that were then classified into themes. The data presented strategies that when applied by industry and security teams, will improve incident response times.
... The value of the relationship between the two parties in proper information sharing involves the service providers' trust and commitment to the client and the ability to perform its operations flexibly (Pomerleau, 2019). Outsourcing is a way of obtaining something sourced internally or could have been sourced internally, notwithstanding the result outside the organization (Mirilla, 2018). It is observed how a company can enter into a contractual relationship between the organization's service agreements (Khanyile, 2019). ...
... El período de retención de los registros generados por las aplicaciones informáticas, es esencial para las investigaciones forenses y auditoría, así como para cumplir con normativas y regulaciones vigentes (Mirilla, 2019 En la Ecuación 2, el representa el período, en segundos, durante el cual se generaron los registros y , hace referencia a la cantidad de registros generados en el tiempo definido. ...
Article
Full-text available
The protection of information is an essential part of the sustainability of organizations. In this scenario, actions aimed at ensuring the auditing of systems with the aim of preventing or detecting violations that affect the integrity, availability and confidentiality of data take on great importance. Among the main problems that arise during the management of audit reports, we find that sometimes it is not known how and from which events records are generated, as well as what treatment is given to the generated records.The main objective of this research is the development of a procedure that contributes to the improvement of the audit record management process from the development of the computer applications to their implementation and operation in order to guarantee the tracking of the systems. To achieve this, firstly, guidelines and standards describing the audit record management process were analyzed. After the analysis, the main aspects to be considered in such process were identified and a procedure applicable to the information management systems was elaborated, which allows the centralized management of the audit records. This procedure was validated by applying the Petri Network method, to check its structure, and implemented in a case study to check the execution of each of the identified activities.