Home > Computing and Information Technology > Computer security > Data encryption > Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC
12%
Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC

Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

A comprehensive and up-to-date exploration of implementing and managing a security operations center in an open-source environment In Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC, a team of veteran cybersecurity practitioners delivers a practical and hands-on discussion of how to set up and operate a security operations center (SOC) in a way that integrates and optimizes existing security procedures. You’ll explore how to implement and manage every relevant aspect of cybersecurity, from foundational infrastructure to consumer access points. In the book, the authors explain why industry standards have become necessary and how they have evolved – and will evolve – to support the growing cybersecurity demands in this space. Readers will also find: A modular design that facilitates use in a variety of classrooms and instructional settings Detailed discussions of SOC tools used for threat prevention and detection, including vulnerability assessment, behavioral monitoring, and asset discovery Hands-on exercises, case studies, and end-of-chapter questions to enable learning and retention Perfect for cybersecurity practitioners and software engineers working in the industry, Open-Source Security Operations Center (SOC) will also prove invaluable to managers, executives, and directors who seek a better technical understanding of how to secure their networks and products.

Table of Contents:
Preface xiii 1 Introduction to SOC Analysis 1 Overview of Security Operations Centers (SOCs) 1 Importance of SOC Analysis 1 Objectives and Scope of the Book 2 Structure of the Book 3 Challenges in SOC 4 SOC Roles and Responsibilities 6 SOC Team Structure and Roles 7 SOC Models and How to Choose 8 Choosing the Right SOC Model 10 Evaluate Where You Are 11 Define the Business Objectives 12 Designing an SOC 13 Future Trends and Developments in SOCs 15 SOC Challenges and Best Practices 16 Best Practices for SOC Management 17 Case Studies and Examples of Successful SOCs 18 References 19 2 SOC Pillars 21 Introduction 21 Definition of SOC Pillars 21 People 22 Process 23 Technology 25 Data 26 Importance of SOC Pillars in Cybersecurity 28 Levels of SOC Analysts 28 Processes 31 Event Triage and Categorization/The Cyber Kill Chain in Practice 31 Prioritization and Analysis/Know Your Network and All Its Assets 33 Remediation and Recovery 34 Assessment and Audit 34 Threat Intelligence 34 Threat Intelligence Types 35 Threat Intelligence Approaches 36 Threat Intelligence Advantages 36 References 36 3 Security Incident Response 39 The Incident Response Lifecycle 39 Incident Handling and Investigation Techniques 40 Post-incident Analysis: Learning from Experience to Strengthen Defenses 42 The Importance of Information Sharing for Effective Incident Response 44 Handling Advanced Persistent Threats and Complex Incidents 47 Communication Strategies During and After Incidents 49 Cross-functional Coordination in Incident Response 51 Leveraging Technical Key Performance Indicators 53 Navigating Incident Impacts Through Decisive Prioritization 55 Adaptive Access Governance 56 Maintaining Response Communications and Integrations 57 Incident Response in Diverse IT Environments 58 Addressing International and Jurisdictional Challenges in Incident Response 60 Mental Health and Stress Management for SOC Analysts and Incident Responders 62 Case Studies and Real-World Incident Analysis: A Crucial Practice for Enhancing Incident Response 63 Analyzing the 2021 Microsoft Exchange Server Vulnerabilities 64 References 64 4 Log and Event Analysis 67 The Role of Log and Event Analysis in SOCs 67 Advanced Log Analysis Techniques 70 Detecting Anomalies and Patterns in Event Data 71 Integrating Log Analysis with Other SOC Activities 72 Enhancing Log Data Security and Integrity 80 Reconstructing the Attack Chain 81 Leveraging APIs for Advanced Threat Detection 83 Cross-platform Log Analysis Challenges and Solutions 88 Developing Skills in Log Analysis for SOC Analysts 90 Spotting Cloud Cryptojacking 91 Integration of Log Analysis with Threat Intelligence Platforms 93 Evaluating Log Analysis Tools and Solutions 94 Addressing the Volume, Velocity, and Variety of Log Data 95 Building a Collaborative Environment for Log Analysis 96 Democratized Threat Intelligence 97 References 97 5 Network Traffic Analysis 99 Traffic Segmentation and Normalization 99 Threat Intelligence Integration 100 Contextual Protocol Analysis 103 Security Regression Testing 107 Network-based Intrusion Detection and Prevention Systems (NIDS/NIPS) 109 Vulnerability Validation 113 Impact Examination 114 Inspecting East–West Traffic 116 Analyzing Jarring Signals 122 Modeling Protocol Behaviors 125 Utilizing Flow Data for Efficient Traffic Analysis 131 Constructing an Implementation Roadmap 134 Performance Optimization Techniques for Traffic Analysis Tools 134 References 136 6 Endpoint Analysis and Threat Hunting 139 Understanding Endpoint Detection and Response Solutions 139 Techniques in Malware Analysis and Reverse Engineering 141 Data and Asset-Focused Risk Models 144 The Role of Behavioral Analytics in Endpoint Security 146 Principles for Minimizing Endpoint Attack Surfaces 149 Advanced Managed Endpoint Protection Services 154 Adapting Monitoring Strategies to Fragmented Cloud Data Visibility 156 Responding to Events at Scale 161 Case Study: Financial Services Organization 167 References 168 7 Security Information and Event Management (SIEM) 169 Fundamentals of SIEM Systems 169 Distributed Processing 172 Next-gen Use Cases 175 Accelerated Threat Hunting 176 Compliance and Regulatory Reporting with SIEM 178 Infrastructure Management 181 The Insider Threat Landscape 185 SIEM Log Retention Strategies and Best Practices 187 Automated Response and Remediation with SIEM 189 Threat Hunting with SIEM: Techniques and Tools 191 SIEM and the Integration of Threat Intelligence Feeds 193 Common SIEM Capability Considerations 197 Operational Requirements 199 Comparing Commercial SIEM Providers 202 Proof of Concept Technical Evaluations 203 References 204 8 Security Analytics and Machine Learning in SOC 207 Behavioral Analytics and UEBA (User and Entity Behavior Analytics) 209 Machine Learning Algorithms Used in Security Analytics 211 Challenges of Operationalizing Predictive Models 215 Custom Machine Learning Models Versus Pre-built Analytics 217 Optimizing SOC Processes with Orchestration Playbooks 219 Anomaly Detection Techniques and Their Applications in SOC 220 Investigative Analysis 223 Challenges in Data Normalization and Integration 225 References 228 9 Incident Response Automation and Orchestration 231 Introduction 231 Evaluating the Impact of Automation in SOCs 233 The Role of Playbooks in Incident Response Automation 235 Threat-Specific Versus Generic Playbooks 237 Automated Threat Intelligence Gathering and Application 240 Automating Collection from Diverse Sources 241 Measuring the Efficiency and Effectiveness of Automated Systems 245 Critical Success Factors for High-Performance SOCs 246 Improving SOC Performance 247 Centralizing Cloud Data and Tooling 251 Maintaining Compliance Through Automated Assurance 253 Injecting Human-Centered Governance 255 References 256 10 SOC Metrics and Performance Measurement 259 Introduction 259 Core Areas for SOC Metrics 259 Advancing Cyber Resilience with Insights 261 Performance Measurement 265 Utilizing Automation for Real-Time Metrics Tracking 266 Anomaly Detection 267 Integrating Customer Feedback into Performance Measurement 268 Metrics for Evaluating Incident Response Effectiveness 270 Assessing SOC Team Well-being and Workload Balance 271 Skills Investment Gap Assessment 272 Financial Metrics for Evaluating SOC Cost Efficiency and Value 274 Metrics for Measuring Compliance and Regulatory Alignment 276 Artificial Intelligence and Machine Learning 279 Strategies for Addressing Common SOC Performance Challenges 280 Future Trends in SOC Metrics and Performance Evaluation 289 Unifying Metrics for Holistic SOC Insights 292 References 292 11 Compliance and Regulatory Considerations in SOC 295 Introduction 295 Regulatory Challenges Across Geographies 297 Just-in-Time Security Orchestration 298 Managing Incident Responses in a Regulatory Environment 303 Healthcare Data Breaches 305 Financial Services Data Security 306 Energy and Utility Incident Response 306 Future Trajectories 307 Continuous Incident Readiness Assessments 307 Integrating Compliance Requirements into SOC Policies and Procedures 308 Unified GRC Dashboard Visibility 310 Open Banking Third-Party Risk Mitigations 311 The Role of SIEM in Achieving and Demonstrating Compliance 313 Emerging Technology Compliance Gap Forecasting 316 Crown Jewels Risk Assessments 319 Navigating International Compliance and Data Sovereignty Laws 321 The Impact of Emerging Regulations 322 Case Studies: SOC Adaptations 323 NIS Directive Response Planning 324 References 326 12 Cloud Security and SOC Operations 327 Introduction 327 Cloud Access Security Brokers (CASBs) Integration with SOC 330 Continuous Compliance Monitoring 332 Container Sandboxing 334 Compliance Validation and Drift Detection 336 Centralizing IAM Across Hybrid and Multicloud Deployments 337 Data and Key Management for Encryption 339 Preserving Recoverability and Governance 340 Securing Multicloud and Hybrid Cloud Environments 342 Establishing a Root of Trust Across Fragmented Cloud Key Infrastructures 343 Mapping Dependency Context Across Managed Cloud Services 345 Best Practices for Cloud Incident Response Planning 347 Remediating Drift through Policy as Code Frameworks 349 The Role of APIs in Cloud Security and SOC Operations 352 Applying Machine Learning Models to API Data 353 Innovating Detection and Response Capabilities Purpose Built for Cloud 355 Future Trends in Cloud Security and Implications for SOCs 358 References 359 13 Threat Intelligence and Advanced Threat Hunting 361 Advanced Threat-hunting Methodologies 364 Lifecycle Intelligence for Automated Response 366 Operationalizing Threat Intelligence for Proactive Defense 368 The Importance of Context in Actionable Threat Intelligence 370 Threat Intelligence Sharing Platforms and Alliances 372 Estimating Campaign Impacts Optimizing Investment Prioritization 375 Applying Generative Analytics for Incident Discovery 377 Techniques for Effective Threat Hunting in the Cloud 379 Behavioral Analytics for Detecting Insider Threats 382 Developing Skills and Competencies in Threat Hunting 384 Codify Analytic Techniques Targeting Specific IoCs 388 Case Studies: Successful Threat Intelligence and Hunting Operations 390 References 393 14 Emerging Trends and the Future of SOC Analysis 395 Introduction 395 Emerging Trends and the Future of SOC Analysis 395 The Impact of Cloud Security on SOC Operations 397 Predicting Future Directions in SOC Analysis 398 The Rise of Security Orchestration, Automation, and Response (SOAR) 400 Blockchain Technology for Enhanced Security Measures 403 Zero-trust Security Model and SOC Adaptation 406 Enhancing SOC Capabilities with Augmented and Virtual Reality 407 The Impact of 5G Technology on Cybersecurity Practices 408 Post-Quantum Cryptography 411 Financial Sector Complexity 414 Anatomy of Modern APTs 414 Deception Techniques 416 The Future Role of Human Analysts in Increasingly Automated SOCs 417 Tiered Analyst Workforce 418 References 419 15 Cybersecurity Awareness and Training in SOC Operations 421 Designing Effective Cybersecurity Training Programs for SOC Teams 423 Role of Continuous Education in Enhancing SOC Capabilities 425 Case Studies: Impact of Training on Incident Response and Management 426 Implementing Continuous Feedback Loops 428 The Evolving Role of SOCs 431 Gamification for Engagement 433 The Impact of Remote Work on Cybersecurity Training and Awareness 437 Future Trends in Cybersecurity Training and Awareness for SOCs 439 References 441 Index 443


Best Sellers


Product Details
  • ISBN-13: 9781394201600
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Height: 185 mm
  • No of Pages: 480
  • Returnable: N
  • Spine Width: 33 mm
  • Weight: 1096 gr
  • ISBN-10: 1394201605
  • Publisher Date: 19 Sep 2024
  • Binding: Hardback
  • Language: English
  • Returnable: N
  • Returnable: N
  • Sub Title: A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC
  • Width: 262 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC
John Wiley & Sons Inc -
Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Open-Source Security Operations Center (SOC): A Complete Guide to Establishing, Managing, and Maintaining a Modern SOC

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA