Security operations center guidebook : a practical guide for a successful SOC /

Saved in:
Bibliographic Details
Author / Creator:Jarpey, Gregory, author.
Imprint:Kidlington, Oxford, United Kingdom : Butterworth-Heinemann is an imprint of Elsevier, 2017.
Description:1 online resource.
Language:English
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11273906
Hidden Bibliographic Details
Other authors / contributors:McCoy, R. Scott, author.
ISBN:9780128036822
0128036826
9780128036570
0128036575
Notes:Includes index.
Online resource; title from PDF title page (ScienceDirect, viewed June 5, 2017).
Other form:Original 0128036575 9780128036570

MARC

LEADER 00000cam a2200000Ii 4500
001 11273906
006 m o d
007 cr cnu|||unuuu
008 170523s2017 enk o 001 0 eng d
005 20240715212419.6
019 |a 987809552  |a 999553363  |a 1005105755  |a 1005343981 
020 |a 9780128036822  |q (electronic bk.) 
020 |a 0128036826  |q (electronic bk.) 
020 |z 9780128036570  |q (print) 
020 |z 0128036575 
035 |a (OCoLC)987790896  |z (OCoLC)987809552  |z (OCoLC)999553363  |z (OCoLC)1005105755  |z (OCoLC)1005343981 
035 9 |a (OCLCCM-CC)987790896 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d IDEBK  |d EBLCP  |d UIU  |d OPELS  |d N$T  |d CNCGM  |d OCLCF  |d MERER  |d YDX  |d NLE  |d OCLCQ  |d OTZ  |d D6H 
049 |a MAIN 
050 4 |a TK5105.59 
072 7 |a COM  |x 043050  |2 bisacsh 
100 1 |a Jarpey, Gregory,  |e author. 
245 1 0 |a Security operations center guidebook :  |b a practical guide for a successful SOC /  |c Gregory Jarpey, R. Scott McCoy. 
264 1 |a Kidlington, Oxford, United Kingdom :  |b Butterworth-Heinemann is an imprint of Elsevier,  |c 2017. 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a computer  |b c  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/c 
338 |a online resource  |b cr  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/cr 
505 0 |a Front Cover; Security Operations Center Guidebook; Copyright Page; Dedication; Contents; Introduction; A Rocky Start; I. Developing Your Security Operations Center; 1 What is a Security Operations Center?; Third Party; Hybrid; Dedicated; Historical Lessons; 2 Needs Assessment; Risk Assessment; Types of Companies; A Single Suite in a Larger Office Complex That Operates Primarily During Business Hours; A Single Location Dedicated to Only Your Company, with no Other Tenants; A Single Campus with Multiple Buildings; Multiple Locations Located in the Same Metro Area 
505 8 |a Multiple Locations Spread across a Single Country and Multiple Locations Spread across Several CountriesAdditional Considerations; Historical Lessons; Vulnerable Adults; Modest Beginnings; 3 Business Case; Example; Historical Lessons; First Attempt; A Unique Approach; 4 Building Your SOC; Workstations; Historical Lessons; 5 Staffing Options; Training; Career Progression; Retention; Historical Lessons; II. Operations; 6 Responsibilities and Duties; Introduction; Welcome to the SOC-You Have an Important Role; Mission Statement; SCO Job Description; Sample SCO Job Description; Position Summary 
505 8 |a Duties and ResponsibilitiesQualifications; Physical Demands/Environmental Conditions; Hiring and Interviewing Your SCO Candidate; Sample Interview Questions for a SCO; Staffing and Schedule; Sample Three-Week Rotation; Supervisory Authority; Staff Responsibility; Historical Lessons; 7 Post Orders and Procedures; Introduction; Setting Up Your Post Orders; Create a Shared Email Address for Security Inquiries and Requests; Performance of Duties; Example Post Order Table of Contents Setup and Their Purpose; Chapter One-Introduction; Chapter Two-Duties; Chapter Three-Call Center Procedures 
505 8 |a Chapter Four-Emergency ProceduresChapter Five-Standards and Policies; Chapter Six-Equipment Procedures; Chapter Seven-Post Order Changes and Updates; Chapter Eight-Appendices; Site Procedures; Section One-Site Info; Section Two-Intrusion Alarm Response; Section Three-Fire Alarm Response; Section Four-Mechanical Alarms; Section Five-Contact Lists; Section Six-Special Instructions; Historical Lessons; 8 Training Programs; Introduction; Getting Started; New Hire Training Schedule; Individual Training Checklist; Monthly, Quarterly, and Annual Training; Historical Lessons 
505 8 |a 9 Enterprise Access ControlIntroduction; Setting Up Your Physical Access Control System; Operator Permissions; Card Access Programming and Control; Setting up and Controlling Your Restricted Areas Access; Creating a Restricted Area; Access Approvals, Denials, and Removals; Access Control Matrix; Site Access Control; Follow These Steps; System Status Checks; Troubleshooting; Historical Lessons; 10 Alarm Monitoring; Introduction; Physical Access Control System (PACS) or Intrusion Detection System (IDS) Alarms; Alarm Instructions; Receiving Alarms 
500 |a Includes index. 
588 0 |a Online resource; title from PDF title page (ScienceDirect, viewed June 5, 2017). 
650 0 |a Computer networks  |x Security measures.  |0 http://id.loc.gov/authorities/subjects/sh94001277 
650 0 |a Computer networks  |x Access control.  |0 http://id.loc.gov/authorities/subjects/sh2007008424 
650 7 |a COMPUTERS / Security / Networking  |2 bisacsh 
650 7 |a Computer networks  |x Access control.  |2 fast  |0 http://id.worldcat.org/fast/fst00872298 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 http://id.worldcat.org/fast/fst00872341 
655 4 |a Electronic books. 
700 1 |a McCoy, R. Scott,  |e author. 
776 0 8 |c Original  |z 0128036575  |z 9780128036570  |w (OCoLC)962889202 
903 |a HeVa 
929 |a oclccm 
999 f f |i d73c2d3e-d39f-51dd-8663-f3ab17f11daf  |s a29951f9-f38f-5887-ae5a-2099bbf8ec8e 
928 |t Library of Congress classification  |a TK5105.59  |l Online  |c UC-FullText  |u https://www.sciencedirect.com/science/book/9780128036570  |z Elsevier  |g ebooks  |i 10980283