Academic literature on the topic 'Cybersecurity Operations Center'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity Operations Center.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Cybersecurity Operations Center"

1

BOLILYI, V. O., L. P. SUKHOVIRSKA та O. M. LUNHOL. "ОПЕРАЦІЙНИЙ ЦЕНТР БЕЗПЕКИ ЯК ПОСЛУГА НА ОСНОВІ SIEM". Scientific papers of Berdiansk State Pedagogical University Series Pedagogical sciences 1, № 2 (2021): 177–86. http://dx.doi.org/10.31494/2412-9208-2021-1-2-177-186.

Full text
Abstract:
This study examines the Security Operations Center, which provides detection and analysis of cybersecurity, rapid response, and prevention of cyber attacks. Security Operations Center technologies are used to provide visibility and enable analysts to protect against attacks. The algorithm of presenting the topic «Security Center» during the teaching of the discipline «Security of programs and data» at the Volodymyr Vynnychenko Central Ukrainian State Pedagogical University is shown, namely the problems of implementation of event monitoring systems «Security information and event management», t
APA, Harvard, Vancouver, ISO, and other styles
2

I, Putu Elba Duta Nugraha. "A Review on the Role of Modern SOC in Cybersecurity Operations." International Journal of Current Science Research and Review 04, no. 05 (2021): 408–14. https://doi.org/10.47191/ijcsrr/V4-i5-13.

Full text
Abstract:
Abstract : This paper will examine the position and mission of today’s Security Operation Center (SOC), as well as the numerous tools available to those interested in pursuing a career in cybersecurity operations. Defending against today’s threats necessitates a method that is formalized, organized, and disciplined. Professionals in a Security Operations Center (SOC) are commonly used by businesses. SOCs provide a wide variety of services, from monitoring and control to comprehensive threat solutions and hosted security, all of which can be tailored to suit the needs of individual
APA, Harvard, Vancouver, ISO, and other styles
3

Taylor, Ivan W., and Keith D. Willett. "Modeling Cybersecurity Operations to Improve Resilience." INCOSE International Symposium 34, no. 1 (2024): 53–71. http://dx.doi.org/10.1002/iis2.13132.

Full text
Abstract:
AbstractIn this paper, we explore the concept of operational resilience of a network or system of computer systems, focusing on the processes of a cybersecurity team within the multi‐disciplinary network security operations center. The computer system under examination has faced a cyber‐attack that has reduced its capability. The organization's reputation is damaged temporarily but can be restored if the network security operations center can quickly restore the organization's ability to produce desired results. After a cyber‐attack, we examine the processes for restoring the system's capabili
APA, Harvard, Vancouver, ISO, and other styles
4

Dr.A.Shaji, George, and George A.S.Hovan. "Anatomy of Cybersecurity." Partners Universal Multidisciplinary Research Journal (PUMRJ) 02, no. 01 (2025): 1–6. https://doi.org/10.5281/zenodo.14738079.

Full text
Abstract:
Cybersecurity is the defense of systems and networks connected to the internet including hardware, software, and data from cyberattacks. The elements of a strong cybersecurity system are compared in this study paper with the similar elements of the human body that help to preserve general health and welfare. The aim is to offer an explanatory analogy for improved knowledge of cybersecurity and how its several components work together in a tiered protection. Analyzing the main features of cybersecurity systems and making analogies to human body anatomical systems constituted part of the approac
APA, Harvard, Vancouver, ISO, and other styles
5

Shah, Ankit, Rajesh Ganesan, Sushil Jajodia, and Hasan Cam. "Optimal Assignment of Sensors to Analysts in a Cybersecurity Operations Center." IEEE Systems Journal 13, no. 1 (2019): 1060–71. http://dx.doi.org/10.1109/jsyst.2018.2809506.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shah, Ankit, Rajesh Ganesan, Sushil Jajodia, and Hasan Cam. "An Outsourcing Model for Alert Analysis in a Cybersecurity Operations Center." ACM Transactions on the Web 14, no. 1 (2020): 1–22. http://dx.doi.org/10.1145/3372498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ken, Basari, and Aldianto Leo. "Adopting Security Operation Center: Insights from the Indonesian Financial Sector." International Journal of Current Science Research and Review 08, no. 03 (2025): 1051–66. https://doi.org/10.5281/zenodo.14978634.

Full text
Abstract:
Abstract : The rising cybersecurity threats have made Security Operation Centers (SOCs) essential for Indonesian finance companies to protect sensitive data and ensure regulatory compliance. This study explores factors influencing SOC adoption, implementation challenges, and strategies to improve adoption rates. Using a mixed-method approach, it combines survey data and interviews with cybersecurity professionals. Findings reveal that subjective norms and top management support are key drivers, while budget constraints and a lack of skilled personnel pose significant challenges. Recommendation
APA, Harvard, Vancouver, ISO, and other styles
8

Ismail, Rahmat Kurnia, Farid Widyatama, et al. "Enhancing Security Operations Center: Wazuh Security Event Response with Retrieval-Augmented-Generation-Driven Copilot." Sensors 25, no. 3 (2025): 870. https://doi.org/10.3390/s25030870.

Full text
Abstract:
The sophistication of cyberthreats demands more efficient and intelligent tools to support Security Operations Centers (SOCs) in managing and mitigating incidents. To address this, we developed the Security Event Response Copilot (SERC), a system designed to assist analysts in responding to and mitigating security breaches more effectively. SERC integrates two core components: (1) security event data extraction using Retrieval-Augmented Generation (RAG) methods, and (2) LLM-based incident response guidance. This paper specifically utilizes Wazuh, an open-source Security Information and Event M
APA, Harvard, Vancouver, ISO, and other styles
9

Hámornik, Balázs Péter, and Csaba Krasznay. "Prerequisites of Virtual Teamwork in Security Operations Centers: Knowledge, Skills, Abilities and Other Characteristics." Academic and Applied Research in Military and Public Management Science 16, no. 3 (2017): 73–92. http://dx.doi.org/10.32565/aarms.2017.3.5.

Full text
Abstract:
Cybersecurity is an emerging field of national security where usually the technical aspects of defense take first place. Cyberdefense is heavily relaying on teamwork where members of Computer Emergency Response Team (CERT) or Computer Security Incident Response Team (CSIRT) or Security Operations Center (SOC) teams are often geographically dispersed. In cybersecurity teamwork, computer supported collaboration is crucial as the team functions virtually in many ways.In this paper we present the results of interviews that were conducted with SOC exerts and we summarize the reviewed relevant liter
APA, Harvard, Vancouver, ISO, and other styles
10

Bassey, Christian, Ebenezer Tonye Chinda, and Samson Idowu. "Building a Scalable Security Operations Center: A Focus on Open-source Tools." Journal of Engineering Research and Reports 26, no. 7 (2024): 196–209. http://dx.doi.org/10.9734/jerr/2024/v26i71203.

Full text
Abstract:
Given the prevalence of a wide variety of cyber attacks against businesses of all sizes, it is essential to ensure that adequate security monitoring of organizational assets and infrastructure is in place to ensure the early detection and response to security incidents. By using a security information and event management (SIEM) tool in collaboration with other security tools, such as an extended detection and response (XDR) tool, all housed in an organizational unit, adequate security monitoring and response to detected incidents can be achieved. This research builds a SOC architecture with v
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Cybersecurity Operations Center"

1

Cardarelli, Anthony. "Automated Deployment of a Security Operations Center." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1592133599167901.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Elisa, Francesco Lupo. "A Situational Awareness Dashboard for a Security Operations Center." Master's thesis, 2021. http://hdl.handle.net/10362/133360.

Full text
Abstract:
As a result of this dissertation, a solution was developed which would provide visibility into an institution’s security posture and its exposure to risk. Achieving this required the development of a Situational Awareness Dashboard in a cybersecurity context. This Dashboard provides a unified point of view where workers ranging from analysts to members of the executive board can consult and interact with a visual interface that aggregates a set of strategically picked metrics. These metrics provide insight regarding two main topics, the performance and risk of the organization’s Security
APA, Harvard, Vancouver, ISO, and other styles
3

Mateus, Marco Alexandre Clemente. "HANDLING CYBERSECURITY RELATED INCIDENTS IN THE SECURITY OPERATION CENTER OF THE POLYTECHNIC OF LEIRIA." Master's thesis, 2021. http://hdl.handle.net/10400.8/6695.

Full text
Abstract:
In the present day, IT systems are an integral part of most organizations, and play a huge role it their success. With the necessity to connect these systems to the internet to further amplify their benefits and possibilities, comes the issue of cybersecurity. Allied to the importance of these systems for the organizations, comes the interest of attackers in disrupting these same services. When the amount of cyberattacks occurring everyday is taken into consideration, and how these might impact organizations, this issue becomes one of the greatest challenges they have to deal with. The
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Cybersecurity Operations Center"

1

National Cybersecurity and Communications Integration Center Act of 2014: Report of the Committee on Homeland Security and Governmental Affairs, United States Senate, to accompany S. 2519, to codify an existing operations center for cybersecurity. U.S. Government Printing Office, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

McLaughlin, Kevin Lynn. Cybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

McLaughlin, Kevin Lynn. Cybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

McLaughlin, Kevin Lynn. Cybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

McLaughlin, Kevin Lynn. Cybersecurity Operations and Fusion Centers: A Comprehensive Guide to SOC and TIC Strategy. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Cybersecurity Operations Center"

1

McLaughlin, Kevin Lynn. "Cybersecurity Operations and Fusion Center." In Cybersecurity Operations and Fusion Centers. CRC Press, 2023. http://dx.doi.org/10.1201/9781003259152-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Thompson, Eric C. "HIPAA Security Rule and Cybersecurity Operations." In Designing a HIPAA-Compliant Security Operations Center. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5608-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

McLaughlin, Kevin Lynn. "What Is a Cybersecurity Operations and Fusion Center (SOFC) and Why Do You Need One?" In Cybersecurity Operations and Fusion Centers. CRC Press, 2023. http://dx.doi.org/10.1201/9781003259152-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ganesan, Rajesh, Ankit Shah, Sushil Jajodia, and Hasan Cam. "A Novel Metric for Measuring Operational Effectiveness of a Cybersecurity Operations Center." In Network Security Metrics. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66505-4_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dimitrov, Willian, Georgi Dimitrov, Kamen Spasov, and Svetlana Syarova. "Conceptual Model for a Shared Cybersecurity Operations Center for ICS." In Lecture Notes in Networks and Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90321-3_40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

DeCusatis, C., R. Cannistra, A. Labouseur, and M. Johnson. "Design and Implementation of a Research and Education Cybersecurity Operations Center." In Advanced Sciences and Technologies for Security Applications. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16837-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nikolov, Borislav M. "Improving Cybersecurity Capabilities at Nikola Vaptsarov Naval Academy by Building and Developing a Security Operations and Training Center." In Communications in Computer and Information Science. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-44440-1_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

McLaughlin, Kevin Lynn. "Foundations of Security Operations or SecOps." In Cybersecurity Operations and Fusion Centers. CRC Press, 2023. http://dx.doi.org/10.1201/9781003259152-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

McLaughlin, Kevin Lynn. "SOFC Infrastructure and Toolset." In Cybersecurity Operations and Fusion Centers. CRC Press, 2023. http://dx.doi.org/10.1201/9781003259152-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

McLaughlin, Kevin Lynn. "Detection, Response, and Remediation." In Cybersecurity Operations and Fusion Centers. CRC Press, 2023. http://dx.doi.org/10.1201/9781003259152-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Cybersecurity Operations Center"

1

Falé, Pedro, Leonilde Reis, and Rui Almeida. "Cybersecurity – Security Operations Center." In Sixth International Scientific Conference ITEMA Recent Advances in Information Technology, Tourism, Economics, Management and Agriculture. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2022. http://dx.doi.org/10.31410/itema.2022.99.

Full text
Abstract:
Currently, most organizations are dependent on Information and Communication Technologies, in the sense of accomplishing their underly­ing business activities. In this scope, cybersecurity is considered the domain that has the strength to protect sensitive information, be it at the individu­al level or in an organizational context. The objective of this paper is to in­troduce the concept, relevance, and functions of a Security Operations Cen­tre. The methodology underlying the study was based on the use of the MI­TRE Adversarial Tactics, Techniques and Common Knowledge framework as a matrix of
APA, Harvard, Vancouver, ISO, and other styles
2

Ghosh, Anup K. "A Data-driven Approach to Rating Cybersecurity Risk and Investing SOC Resources Efficiently." In Workshop on Security Operation Center Operations and Construction. Internet Society, 2023. http://dx.doi.org/10.14722/wosoc.2023.23022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chang, Kevin, and Brett Seely. "The challenging nexus of technology and security in transportation management center operations." In CyberSec '18: Fifth Cybersecurity Symposium. ACM, 2018. http://dx.doi.org/10.1145/3212687.3212860.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Yunpeng Jack, Kailai Wang, Lingguang Song, et al. "USDOT Tier-1 University Transportation Center for Advancing Cybersecurity Research and Education." In 2023 IEEE International Conference on Mobility, Operations, Services and Technologies (MOST). IEEE, 2023. http://dx.doi.org/10.1109/most57249.2023.00036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cram, W. Alec, and Ian Mckillop. "Evaluating a Cybersecurity Operations Center Implementation Program in a Regional Healthcare System: Challenges and Lessons Learned." In Hawaii International Conference on System Sciences. Hawaii International Conference on System Sciences, 2024. https://doi.org/10.24251/hicss.2024.451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Savola, Reijo. "Towards Scalable Solutions of Operational Technology Cybersecurity in Smart Energy Networks." In 16th International Conference on Applied Human Factors and Ergonomics (AHFE 2025). AHFE International, 2025. https://doi.org/10.54941/ahfe1006141.

Full text
Abstract:
During the last years, operational technology cybersecurity threat landscape has become wider, due to the increase of digitalization, more sophisticated cyberattacks and increase of ransomware. Dependence on energy and information networking and operational technology inevitably exposes smart energy networks to potential vulnerabilities associated with networking systems. This increases the risk of compromising reliable and secure use of them. Network intrusion by adversaries may lead to a variety of severe consequences from customer information leakage to a cascade of failures, such as massiv
APA, Harvard, Vancouver, ISO, and other styles
7

Alhawas, Haya, Noura Althemali, Renad Alkhaldi, Renad Alziyadi, and Maali Alabdulhafith. "Flagged: Cybersecurity Training and Awareness System Through Virtual Reality." In 5th International Conference on Networks, Blockchain and Internet of Things. Academy & Industry Research Collaboration Center, 2024. http://dx.doi.org/10.5121/csit.2024.140505.

Full text
Abstract:
With the persistent rapid growth and sophistication of cyberattack attacks, organizations and individuals have a growing need to prioritize cybersecurity measures. The variety of attacks has posed new challenges and made it difficult to defend against all attacks. The existing traditional training methods are inadequate to keep up with the changing nature of cyberattacks. This project will address the essential problems in cybersecurity training, which are lack of awareness, inadequate customization, and the ineffectiveness of traditional methods, and it will offer a streamlined solution to so
APA, Harvard, Vancouver, ISO, and other styles
8

Tafa, Igli, and Kevin Shahollari. "Reducing Cyber Incident Response to Protect CNI from Cyber Attacks using an N-SIEM Integration with an ICTI-CNI." In 2nd International Conference on Machine Learning Techniques and Data Science (MLDS 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111818.

Full text
Abstract:
The rapid evolution of technology has increased the role of cybersecurity and put it at the center of nationalcritical infrastructure. This role supports and guarantees the vital services of (CNI) while provides the proper functionalities for running operations between the public and private sectors. This evolution has hadthe same impact on cyberattack tools, methods, techniques used to gain unauthorized access to these computer systems that contain confidential and high-value information in the digital data sales market or asit called "darkweb". As a result, it has become necessary to monitor
APA, Harvard, Vancouver, ISO, and other styles
9

Onwubiko, Cyril. "CoCoa: An Ontology for Cybersecurity Operations Centre Analysis Process." In 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). IEEE, 2018. http://dx.doi.org/10.1109/cybersa.2018.8551486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mocanu, Florin, and Luminița Scripcariu. "Implementation of a Security Operation Center - An Essential Cybersecurity Solution for Organizations." In 2023 27th International Conference on System Theory, Control and Computing (ICSTCC). IEEE, 2023. http://dx.doi.org/10.1109/icstcc59206.2023.10308432.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Cybersecurity Operations Center"

1

Cary, Dakota. China’s CyberAI Talent Pipeline. Center for Security and Emerging Technology, 2021. http://dx.doi.org/10.51593/2020ca017.

Full text
Abstract:
To what extent does China’s cultivation of talent in cybersecurity and AI matter in terms of competitiveness with other countries? Right now, it seems to have an edge: China’s 11 World-Class Cybersecurity Schools offer more classes on artificial intelligence and machine learning than do the 20 U.S. universities certified as Centers of Academic Excellence in Cyber Operations. This policy brief recommends tracking 13 research grants from the National Science Foundation that attempt to integrate AI into cybersecurity curricula.
APA, Harvard, Vancouver, ISO, and other styles
2

Nagle, Frank, James Dana, Jennifer Hoffman, Steven Randazzo, and Yanuo Zhou. Census II of Free and Open Source Software — Application Libraries. The Linux Foundation, 2022. https://doi.org/10.70828/kheh5209.

Full text
Abstract:
Produced in partnership with Harvard Laboratory for Innovation Science (LISH) and the Open Source Security Foundation (OpenSSF), Census II is the second investigation into the widespread use of Free and Open Source Software (FOSS). The Census II effort utilizes data from partner Software Composition Analysis (SCA) companies including Snyk, the Synopsys Cybersecurity Research Center (CyRC), and FOSSA. The aggregated data includes over half a million observations of FOSS libraries used in production applications at thousands of companies, aiming to shed light on the most commonly used FOSS packa
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!