Publication Cover
EDPACS
The EDP Audit, Control, and Security Newsletter
Volume 67, 2023 - Issue 3
253
Views
0
CrossRef citations to date
0
Altmetric
Research Article

A MATURITY CAPABILITY FRAMEWORK FOR SECURITY OPERATION CENTER

References

  • Alharbi, N. (2020). A Security Operation Center Maturity Model (SOC-MM) in the Context of Newly Emerging Cyber Threats (Doctoral dissertation, The Claremont Graduate University).
  • Chamkar, S. A., Maleh, Y., & Gherabi, N. (2022). The human factor capabilities in security operation center (SOC). EDPACS, 66(1), 1–14. doi:10.1080/07366981.2021.1977026.
  • Cichonski, P., Millar, T., Grance, T., & Scarfone, K. (2012). Computer security incident handling guide. NIST Special Publication, 800(61), 1–147.
  • Crowley, C., & Pescatore, J. (2019). Common and Best Practices for Security Operations Centers: Results of the 2019 SOC Survey. SANS Institute.
  • Edgar, T., & Manz, D. (2017). Research methods for cyber security. Syngress.
  • Exabeam (2019). SOC, SecOps and SIEM: How They Work Together. Retrieved October 22, 2022 from Exabeam website: https://www.exabeam.com/explainers/siem/the-soc-secops-and-siem/
  • Hevner, A., & Chatterjee, S. (2010). Design science research in information systems. In Design research in information systems (pp. 9–22). Boston, MA: Springer.
  • Hewlett Packard (2013). 5G/SOC: SOC Generations -HP ESP Security Intelligence and Operations Consulting Services—Business white paper. Retrieved from http://www.cnmeonline.com/myresources/hpe/docs/HP_ArcSight_WhitePapers_5GSOC_SO C_Generations.PDF
  • Hoffmann, M. (2014). How to build a successful SOC. Presentation presented at the Protect. Washington, D.C. Retrieved from https://h41382.www4.hpe.com/gfsshared/downloads-312.pdf
  • Jacobs, P., Arnab, A., & Irwin, B. (2013, August). Classification of security operation centers. In 2013 Information Security for South Africa (pp. 1–7). IEEE. doi:10.1109/ISSA.2013.6641054
  • Johnson, B. G. (2014). Measuring ISO 27001 ISMS processes. 1–20. https://cdn2.hubspot.net/hubfs/163742/pdf_files/iso27001isms-kpi.pdf?t=1438891985360
  • Kelley, D., & Moritz, R. (2006). Best Practices for Building a Security Operations Center. Information Systems Security, 14(6), 27–32. https://doi.org/10.1201/1086.1065898X/45782.14.6.20060101/91856.6
  • Maleh, Y., Sahid, A., & Belaissaoui, M. (2021). A maturity framework for cybersecurity governance in organizations. EDPACS, 63(6), 1–22. https://doi.org/10.1080/07366981.2020.1815354
  • Maleh, Y., Sahid, A., Ezzati, A., & Belaissaoui, M. (2018). A capability maturity framework for IT security governance in organizations. Advances in Intelligent Systems and Computing, 735. https://doi.org/10.1007/978-3-319-76354-5_20
  • McKenney, S., & Reeves, T. C. (2013). Systematic review of design-based research progress: Is a little knowledge a dangerous thing? Educational Researcher, 42(2), 97–100.
  • Meenan, C., & Laurens, V. (2015). Building a Next-Generation Security Operation Center Based on IBM QRadar and Security Intelligence Concepts. Presentation presented at the InterConnect 2015, Las Vegas. Retrieved from https://www.slideshare.net/ibmsecurity/building-a-nextgeneration-security-operation-centerbased- on-ibm-qradar-and-security-intelligence-concepts
  • Michail, A. (2015). Security operations centers: A business perspective ( Master’s Thesis).
  • Miloslavskaya, N. (2018). Information security management in SOCs and SICs. Journal of Intelligent & Fuzzy Systems, 35(3), 2637–2647.
  • Schinagl, S., Schoon, K., & Paans, R. (2015). A Framework for Designing a Security Operations Centre (SOC). 2015 48th Hawaii International Conference on System Sciences, 2253–2262. https://doi.org/10.1109/HICSS.2015.270
  • van den Berg, J. (2018). Cybersecurity for Everyone. In M. Bartsch & S. Frey (Eds.), Cybersecurity Best Practices. Wiesbaden: Springer Vieweg. https://doi.org/10.1007/978-3-658-21655-9_40
  • Van Os, R. (2016). SOC-CMM: Designing and Evaluating a Tool for Measurement of Capability Maturity in Security Operations Centers. Sweden: Luleå University of Technology.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.