DESIGN OF SECURITY OPERATIONS CENTRE .pdf
Original filename: DESIGN OF SECURITY OPERATIONS CENTRE.pdf
This PDF 1.5 document has been generated by Zamzar, and has been sent on pdf-archive.com on 22/11/2016 at 14:32, from IP address 116.75.x.x.
The current document download page has been viewed 204 times.
File size: 199 KB (2 pages).
Privacy: public file
Download original PDF file
Security Operations Centre Design
Security operations center (SOC) is an integrated unit that is anchored at addressing issues
pertaining to security and all technical aspects in an organization. Various instruments are used
during the process including CCTV cameras, computers, alarms, vehicle barriers, controlling of
lighting, access monitoring, and a host of other sophisticated equipment. SOC is very vital in an
organization for it grant the employees the chance or opportunity to monitor and supervise all
the technological facets of an organization. SOC plays an essential role not only in small
organizations, but also in large entities like government departments, for example, the police
force, army and secret service intelligence. It is designed to help protect employees and
company property, while at the same time keeping out weapons, drugs, and unauthorized
Functions of a Security Operations Centre
In addition, SOC is an essential instrument in the modern business world as it helps in the
minimization and avoidance of losses and theft in organizations as proper surveillance in more
present. This has a favorable impact on the business as profitability, stock level, unnecessary
expenditure and inefficiencies is trimmed down. Furthermore, SOC is the backbone of many
organizations, especially in the US. Firms such as apple, Samsung and other large corporate
have managed to strive partly due to the presence of top-notch SOC. The importance of SOC
cannot be ignored as it helps in the protection of goods, people, and intellectual property.
TYPES OF Security Operations Centers
SOC for information – this is where a company information system is monitored, fortified and
assessed. The system will include websites, applications, databases, data centers, servers,
networks, desktops and other IT related equipment. The main purpose of IT SOCS is to curb
cybercrime and espionage within the business to keep information private and confidential.
This is mainly used by network providers to keep information flow in a good state. This helps in
lowering problems that may involve spying by other providers of the services.
secret service intelligence like KGB, CIA, M15, and NASA operate these SOCS. The reason being
to ensure global security by withstanding terrorism and wars between nations. Global SOCS are
highly valuable for the play a role in ensuring peace and tranquility.
SOC is of paramount importance as it helps in all levels in the corporate world, these include
businesses, governments, secret services and other stakeholders to ensure confidentiality and
concealment of information in an organization. This promotes privacy and protection from
information scavengers who tend to look for information that is not theirs.