Facts you need to know about SOC (Security Operations Center) PowerPoint PPT Presentation

presentation player overlay
About This Presentation
Transcript and Presenter's Notes

Title: Facts you need to know about SOC (Security Operations Center)


1
Facts you need to know about SOC (Security
Operations Center)
SOC i.e., Security Operations Center is that army
which protects you from the terrorists named as
cyber-attacks and online threats. Having said
that, it resembles the 24/7 hardworking forces
dedicated to preventing, detecting, assessing,
and responding to the cyber threats and
vulnerabilities. The team is highly skilled and
organized with the mission of continuously
monitoring and improving the security posture of
an organization. Data Security Data is nothing
but a piece of useful/meaningful information an
organization collects to make decisions and
/stay connected with its customer. Data Security
means protection of data that is stored in
numerous databases and storages, from the
unwanted actions of unauthorized users. For
example, an organizations financial data,
internal company records are meaningful data and
they can be stored on any computing device.
Securing data from unauthorized access, by
applying some set of principles hence becomes
MANDATORY. Information Security or Computer
Security are the other derivatives of Data
Security.
_at_Copyright 2019 esds.co.in
2
Some standard practices for ensuring Data
Security.
  • Disk Encryption- Converting data into a form that
    cannot be easily interpreted without a key that
    makes it legible.
  • Backups- Creating multiple copies of data at
    regular interval so it can be recovered if the
    original copy is lost.
  • Data Masking- Masking certain areas of data so
    sensitive information can be protected from
    unauthorized access.
  • Data Erasure- Ensuring data no longer in use is
    completely removed and cannot be recovered by
    unauthorized people.
  • Threats are not always bound by external sources
    we need to focus on Insider Threats as well
    which now a days are posing more serious risks to
    any organization. We do have lots of security
    measures inside our perimeter but is it not
    enough? Speaking of an organization like ESDS,
    need to protect its integrity from our staff,
    vendors, customers who have Co-located their
    servers, Contractors, etc. The in-depth
    knowledge of our Network Layout, Connectivity,
    Policies, Processes, Business practices
    completely lie in the hands of our staff members.
  • A fully functional SOC is a complex project
    because it has to deal with wide and endless
    range or problems related to the data security.
    As the time gets ahead, there are going to be
    more challenges, and therefore a SOC has to be
    prepared for the same.
  • There is going to be the constant need for
    high-end online security services, and everyone
    has to brace for it! SOC team has a lot of work
    to do and that too tirelessly.

_at_Copyright 2019 esds.co.in
3
  • In todays era, lets look at the major Areas
    that needs to be highly secure are
  • Network Security
  • Having your network hacked or broken into can put
    your business in major jeopardy. Vandalism is
    another common type of attack. This typically
    involves planting of misleading or inappropriate
    information into the system. Network forms the
    backbone of any IT setup and should be a highly
    prioritized considering the growing threat of
    hackers trying to infect as many computers
    possible.
  • Cloud Security
  • Are you someone who is Online or use the
    Social-network, I guess, today everyone is on
    Social Networking Site. Be it Facebook,
    Instagram, Gmail, Dropbox, Google drive. Bottom
    line is, if you are using any of these then
    certainly you are using cloud computing.
  • Cloud is nothing but virtual space for storing
    data. Theres no contesting the fact that storing
    information in the cloud has its benefits. After
    all, companies no longer have to invest in (Big
    Servers, Large infrastructure, IT Staff). They
    can just get space with a cloud service provider
    like ESDS and work on a flexible pay-as-usage
    model.
  • Mobile Security
  • Today everyone is mobile and security mobility
    and end points hence is mandatory. Some of the
    processes one can follow are as follows
  • Backup regularly using the trusted backup
    resources.
  • Setting up strong password policy so no one has
    direct access to your mobile.
  • Physical damages are completely individual
    responsibilities. No amount of measures
    implemented in terms of technology can safeguard
    against physical damage.

_at_Copyright 2019 esds.co.in
Write a Comment
User Comments (0)
About PowerShow.com