Cargando…

Security operations center guidebook : a practical guide for a successful SOC /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Jarpey, Gregory (Autor), McCoy, R. Scott (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Kidlington, Oxford, United Kingdom : Butterworth-Heinemann is an imprint of Elsevier, 2017.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ii 4500
001 SCIDIR_ocn987790896
003 OCoLC
005 20231120112231.0
006 m o d
007 cr cnu|||unuuu
008 170523s2017 enk o 001 0 eng d
010 |a  2017932729 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d IDEBK  |d EBLCP  |d UIU  |d OPELS  |d N$T  |d CNCGM  |d OCLCF  |d MERER  |d YDX  |d NLE  |d OCLCQ  |d OTZ  |d D6H  |d U3W  |d MERUC  |d OCLCQ  |d CEF  |d OCLCQ  |d WYU  |d ABC  |d UKMGB  |d OCLCQ  |d S2H  |d OCLCO  |d LVT  |d VT2  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB783945  |2 bnb 
016 7 |a 018345005  |2 Uk 
019 |a 987809552  |a 999553363  |a 1005105755  |a 1005343981  |a 1066430245  |a 1229336178  |a 1235841550 
020 |a 9780128036822  |q (electronic bk.) 
020 |a 0128036826  |q (electronic bk.) 
020 |z 9780128036570  |q (print) 
020 |z 0128036575 
035 |a (OCoLC)987790896  |z (OCoLC)987809552  |z (OCoLC)999553363  |z (OCoLC)1005105755  |z (OCoLC)1005343981  |z (OCoLC)1066430245  |z (OCoLC)1229336178  |z (OCoLC)1235841550 
050 4 |a TK5105.59 
072 7 |a COM  |x 043050  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
100 1 |a Jarpey, Gregory,  |e author. 
245 1 0 |a Security operations center guidebook :  |b a practical guide for a successful SOC /  |c Gregory Jarpey, R. Scott McCoy. 
264 1 |a Kidlington, Oxford, United Kingdom :  |b Butterworth-Heinemann is an imprint of Elsevier,  |c 2017. 
264 4 |c �2017 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Front Cover; Security Operations Center Guidebook; Copyright Page; Dedication; Contents; Introduction; A Rocky Start; I. Developing Your Security Operations Center; 1 What is a Security Operations Center?; Third Party; Hybrid; Dedicated; Historical Lessons; 2 Needs Assessment; Risk Assessment; Types of Companies; A Single Suite in a Larger Office Complex That Operates Primarily During Business Hours; A Single Location Dedicated to Only Your Company, with no Other Tenants; A Single Campus with Multiple Buildings; Multiple Locations Located in the Same Metro Area. 
505 8 |a Multiple Locations Spread across a Single Country and Multiple Locations Spread across Several CountriesAdditional Considerations; Historical Lessons; Vulnerable Adults; Modest Beginnings; 3 Business Case; Example; Historical Lessons; First Attempt; A Unique Approach; 4 Building Your SOC; Workstations; Historical Lessons; 5 Staffing Options; Training; Career Progression; Retention; Historical Lessons; II. Operations; 6 Responsibilities and Duties; Introduction; Welcome to the SOC-You Have an Important Role; Mission Statement; SCO Job Description; Sample SCO Job Description; Position Summary. 
505 8 |a Duties and ResponsibilitiesQualifications; Physical Demands/Environmental Conditions; Hiring and Interviewing Your SCO Candidate; Sample Interview Questions for a SCO; Staffing and Schedule; Sample Three-Week Rotation; Supervisory Authority; Staff Responsibility; Historical Lessons; 7 Post Orders and Procedures; Introduction; Setting Up Your Post Orders; Create a Shared Email Address for Security Inquiries and Requests; Performance of Duties; Example Post Order Table of Contents Setup and Their Purpose; Chapter One-Introduction; Chapter Two-Duties; Chapter Three-Call Center Procedures. 
505 8 |a Chapter Four-Emergency ProceduresChapter Five-Standards and Policies; Chapter Six-Equipment Procedures; Chapter Seven-Post Order Changes and Updates; Chapter Eight-Appendices; Site Procedures; Section One-Site Info; Section Two-Intrusion Alarm Response; Section Three-Fire Alarm Response; Section Four-Mechanical Alarms; Section Five-Contact Lists; Section Six-Special Instructions; Historical Lessons; 8 Training Programs; Introduction; Getting Started; New Hire Training Schedule; Individual Training Checklist; Monthly, Quarterly, and Annual Training; Historical Lessons. 
505 8 |a 9 Enterprise Access ControlIntroduction; Setting Up Your Physical Access Control System; Operator Permissions; Card Access Programming and Control; Setting up and Controlling Your Restricted Areas Access; Creating a Restricted Area; Access Approvals, Denials, and Removals; Access Control Matrix; Site Access Control; Follow These Steps; System Status Checks; Troubleshooting; Historical Lessons; 10 Alarm Monitoring; Introduction; Physical Access Control System (PACS) or Intrusion Detection System (IDS) Alarms; Alarm Instructions; Receiving Alarms. 
500 |a Includes index. 
588 0 |a Online resource; title from PDF title page (ScienceDirect, viewed June 5, 2017). 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer networks  |x Access control. 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 7 |a COMPUTERS  |x Security  |x Networking.  |2 bisacsh 
650 7 |a Computer networks  |x Access control  |2 fast  |0 (OCoLC)fst00872298 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
700 1 |a McCoy, R. Scott,  |e author. 
776 0 8 |i Print version:  |a Jarpey, Gregory.  |t Security operations center guidebook.  |d �2017  |z 0128036575  |z 9780128036570  |w (OCoLC)962889202 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780128036570  |z Texto completo