Author:
Onome Dr. Oghene Augustine,
Abstract
The aim of this article looks into the comprehensive methods in re-architecting a security operations centre (SOC) to protect corporate computing frameworks. Through persistent exploitation using advanced technologies, cyber threat infiltration has caused financial losses to enterprises all over the world. No progress has been made yet in terms of technological improvements, particularly in combining cybersecurity equipment. Cybercriminals, on the other hand, are constantly improving their tools and methodologies in order to breach any business. Multiple exploitations through networks, systems, and phishing emails have resulted in incoming dangers, threats, and vulnerabilities in areas such as data privacy and security due to rapid technological advancement. To protect their working environment, several firms in many sectors have resorted outmoded technologies which are ineffective in the face of advanced persistent threats (APT). Cybersecurity actors are well-equipped groups with extensive knowledge that can infiltrate even the most secure of organizations. Cyber security is seen as a major issue around the world. As a result, dedicated cyber security researchers are analysing both existing dangers and emerging threat approach patterns in order to develop a technique that can be integrated with cybersecurity management.
Publisher
Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
Reference16 articles.
1. Gragido, P. Will and John, Cybercrime and Espionage, St. Rockland, Massachusetts : Syngress , 2011.
2. Cole and Eric, Advanced Persistent Threat, St. Rockland, Massachusetts : Syngress , 2012.
3. Winkler and G. A. T. Ira, Advanced Persistent Security, St. Rockland, Massachusetts : Syngress , 2016.
4. Shimonski and Robert, Cyber Reconnaissance, Surveillance and Defense, St, Rockland, Massachusetts: Syngress , 2014.
5. Kilger, C. Dr. Max, J. Gregory, B. Jade and Sean, Reverse Deception: Organizsed Cyber Threat Counter-Exploitation, New York City : McGraw-Hill, 2012.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Digital Twins and Its Security Issues and Implications;International Journal of Innovative Science and Modern Engineering;2023-11-30