Proceedings of the 1st International Conference on Informatics, Engineering, Science and Technology, INCITEST 2019, 18 July 2019, Bandung, Indonesia

Research Article

Success Factors for Cyber Security Operation Center (SOC) Establishment

Download1583 downloads
  • @INPROCEEDINGS{10.4108/eai.18-7-2019.2287841,
        author={M. Abd Majid and K A. Zainol Ariffi},
        title={Success Factors for Cyber Security Operation Center (SOC) Establishment},
        proceedings={Proceedings of the 1st International Conference on Informatics, Engineering, Science and Technology, INCITEST 2019, 18 July 2019, Bandung, Indonesia},
        publisher={EAI},
        proceedings_a={INCITEST},
        year={2019},
        month={10},
        keywords={cyber security operation soc information security strategy prevention defence in depth},
        doi={10.4108/eai.18-7-2019.2287841}
    }
    
  • M. Abd Majid
    K A. Zainol Ariffi
    Year: 2019
    Success Factors for Cyber Security Operation Center (SOC) Establishment
    INCITEST
    EAI
    DOI: 10.4108/eai.18-7-2019.2287841
M. Abd Majid1,*, K A. Zainol Ariffi2
  • 1: Prime Minister Department, MAMPU,Malaysia
  • 2: Faculty of Information Science & Technology, Universiti Kebangsaan Malaysia
*Contact email: maziana@mampu.gov.my

Abstract

The boundless in the digital world is one of the terms used to describe the present state where everything depends mostly on the use of technology. The increased dependency on these technology services has indirectly increased the risk of threats and cyber-attacks. One of the popular solutions to defend against these threats is by implementing the Cyber Security Operation Center (SOC) to monitor, track and handle the cyber incidents. However, there are a number of factors that affect the success of the SOC. Therefore, this paper aims to highlight the importance of the human, process and technology factors towards the establishment of SOC. A comparison of the previous establishment of SOC from the literature is made. The inputs from the literature come from the journal, proceeding, report starting from the year 2011 until 2018. From the result of the comparison, it presents the requirement of human, process, and technology to make sure the SOC work efficiently to defend against the cyber-attack.