0% found this document useful (0 votes)
5 views

1st Unit So Final

The document provides an overview of Security Operations Centres (SOCs), detailing their purpose, key functions, components, and the roles of personnel involved in cybersecurity. It discusses various cyber threats, including malware, phishing, and advanced persistent threats (APTs), as well as the impact of breaches on organizations. Additionally, it emphasizes the importance of investing in security, establishing a security baseline, and adhering to standards and frameworks like ISO/IEC 27001 and NIST Cybersecurity Framework to enhance cybersecurity posture.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

1st Unit So Final

The document provides an overview of Security Operations Centres (SOCs), detailing their purpose, key functions, components, and the roles of personnel involved in cybersecurity. It discusses various cyber threats, including malware, phishing, and advanced persistent threats (APTs), as well as the impact of breaches on organizations. Additionally, it emphasizes the importance of investing in security, establishing a security baseline, and adhering to standards and frameworks like ISO/IEC 27001 and NIST Cybersecurity Framework to enhance cybersecurity posture.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 44

CHAPTER-01

Introduction to Security
Operations
Security Operations Centre (SOC)
Fundamentals
• A Security Operations Centre (SOC) is a
centralized facility within an organization that
continuously monitors, detects, prevents, and
responds to cyber-security threats in real time.
• The SOC acts as the frontline defense against
cyberattacks by leveraging a combination of
people, processes, and technology.
• The primary goal of a SOC is to ensure that the
organization's IT systems and data remain
secure from potential cyber threats by
applying processes, technologies, and
strategies that are capable of identifying
vulnerabilities, reducing risks, and minimizing
the impact of attacks.
Key Functions of a SOC:
• Monitoring: Continuous surveillance of IT systems for
signs of cyber threats and malicious activity.
• Detection: Identifying abnormal or suspicious
activities in the system using security tools and
analytics.
• Response: Responding to identified threats by
mitigating risks, isolating compromised systems, or
performing incident response activities.
• Reporting: Documenting incidents, actions taken, and
reporting findings to stakeholders.
SOC Components (People, Processes,
Technology)
A SOC operates effectively based on three main components:

• People: Skilled cyber-security professionals such as SOC Analysts,


Incident Responders, Threat Hunters, and SOC Managers who
analyze threats and respond to incidents.
• Processes: Well-defined procedures, including security event
monitoring, incident response, and compliance auditing, to
ensure security effectiveness.
• Technology: Security tools such as SIEM (Security Information
and Event Management), IDS/IPS (Intrusion
Detection/Prevention Systems), firewalls, endpoint protection
systems, and forensic tools.
1. People (The Human Element)
• People are the backbone of a SOC. They are
responsible for monitoring, analyzing,
responding to incidents, and maintaining the
security posture of the organization. People in
the SOC perform a range of tasks across
various roles. These roles are typically divided
into three levels or tiers:
• Key SOC Roles and Responsibilities
• SOC teams consist of a variety of specialists, each with unique
responsibilities. Key roles within a SOC include:
• SOC Manager: Oversees SOC operations and ensures processes
and procedures are followed. Ensures the team is adequately
staffed and equipped.
• Security Analyst (Tier 1): Responsible for monitoring alerts,
conducting initial triage, and escalating issues to higher tiers.
• Security Analyst (Tier 2): Performs detailed investigations on
potential threats, analyzing data and identifying the root cause.
• Threat Hunter: Proactively seeks out threats and vulnerabilities
within the system before they can be exploited.
• Forensic Specialist: Specializes in investigating security breaches
after an incident, recovering data, and providing insights into how
an attack occurred.
• Example: A SOC Manager ensures that all
incidents are handled efficiently, teams are
appropriately trained, and that they comply
with regulations like GDPR.
• Example: A Tier 1 analyst notices an abnormal
spike in network traffic and raises an alert
indicating potential DDoS activity.
• Example: A Tier 2 analyst investigates a
phishing attack by examining email headers,
tracking the malicious link, and identifying the
compromised user account.
• Example: A threat hunter reviews network
logs for signs of lateral movement and unusual
command-and-control (C2) communications
to detect an APT attack.
• Example: After a ransomware attack, forensics
specialists recover encrypted files and analyze
how the malware infiltrated the system.
2. Key Processes in a SOC

• Incident Detection & Response: Identifying and


mitigating security incidents.
• Threat Intelligence Integration: Using
external/internal feeds to stay updated on
emerging threats.
• Incident Recovery: Restoring systems and
learning from incidents.
• Compliance & Reporting: Ensuring adherence to
regulatory standards and documenting incidents.
3. Key Technologies in a SOC
• SIEM (Security Information and Event Management):
Collects, analyzes, and correlates security data to
detect threats.
• IDS/IPS (Intrusion Detection/Prevention Systems):
Monitors and blocks malicious network traffic.
• EDR (Endpoint Detection & Response): Monitors and
responds to threats on endpoints like workstations and
servers.
• Firewall & Network Security Tools: Protects the
network perimeter by controlling incoming/outgoing
traffic.
• Threat Intelligence Platforms (TIPs): Aggregates and
analyzes threat data for proactive defense.
• In easy words, SIEM is like a security control room
that collects and analyzes data from all over a
company’s network. It looks for unusual activity
and alerts security teams if something bad
happens.
• IDS/IPS (Intrusion Detection/Prevention
Systems)Imagine IDS/IPS as security guards at the
gate of a building. They monitor traffic coming in
and out of a network.
• IDS (Intrusion Detection System): Detects
suspicious activity and alerts the team.
• IPS (Intrusion Prevention System): Detects and also
blocks the threat before it causes harm.
• EDR (Endpoint Detection & Response)Think of EDR as
a bodyguard for computers. It keeps an eye on
laptops, desktops, and servers, looking for any
strange behavior and taking action if a threat is
found.
• Firewall & Network Security Tools:A firewall is like a
security fence around a company’s network. It
decides what is allowed in and what should be
blocked, keeping hackers and malware out.
• Threat Intelligence Platforms (TIPs)TIPs act like a
news agency for cyber threats. They gather
information about new hacking techniques and help
security teams stay ahead of attackers.
Cyber-threats and the Impact of a Breach

• Cyber-Threats:
• Cyber threats are any deliberate attempts to
compromise the confidentiality, integrity, or
availability of an organization's data, systems,
or networks. The rise of digital transformation
and the increasing connectivity of systems
make organizations highly susceptible to
various cyber threats.
Common Types of Cyber Threats:
• Malware: Malicious software designed to
harm or exploit systems. Examples include
viruses, worms, ransomware, spyware, and
trojans.
• Example: WannaCry ransomware attack
exploited a vulnerability in Microsoft
Windows, locking files and demanding ransom
payments.
• Phishing: Fraudulent attempts to obtain
sensitive information, often by posing as a
legitimate entity. Phishing attacks typically
occur via email or text messages.
• Example: An attacker sends an email
impersonating a bank, asking the recipient to
click a link and enter login credentials on a
fake site.
• DDoS (Distributed Denial of Service) Attacks:
These attacks overwhelm a target system,
such as a website or network, with massive
traffic, making it unavailable to users.
• Example: In 2016, the Dyn DNS DDoS attack
caused widespread internet disruption,
affecting services like Twitter, Reddit, and
Netflix.
• Advanced Persistent Threats (APTs): Long-term,
targeted cyber-attacks often carried out by
nation-state actors or highly skilled cybercriminal
groups. These attacks are stealthy and focused
on stealing valuable information over time.
• Example: The Stuxnet worm, a state-sponsored
attack aimed at sabotaging Iran’s nuclear
program, is a well-known example of an APT.
What are APTs?

• APTs are long-term, secret cyberattacks


carried out by very skilled hackers, often
backed by governments or large criminal
groups. Instead of attacking quickly and
making a mess, APTs are stealthy—they break
into a system quietly and stay hidden for
months or years while stealing important
data.
How do APTs work?
• Hackers sneak into a network using phishing
emails, malware, or security loopholes.
• They stay hidden, slowly moving deeper inside
the system.
• Their goal is to steal valuable data like
government secrets, financial records, or
sensitive business information.
Example: Stuxnet

A powerful computer virus created to damage Iran’s


nuclear program. It was designed to secretly enter
nuclear plant systems and silently sabotage their
operations, causing damage without being
detected for a long time.
• 💡 Analogy:
Think of APTs like a spy secretly living inside a
company, slowly collecting secrets without anyone
noticing, instead of a thief who breaks in and runs
away quickly.
Impact of a Breach:
• A cyber-breach can have serious consequences for
an organization, both in terms of immediate
damage and long-term ramifications.
• For example, if an organization suffers a data
breach, the ramifications could include financial
losses, reputational damage, legal penalties, and
operational disruptions.
• In short, ramifications are the outcomes or effects
that arise as a result of something that has
happened.
• Financial Loss: A breach can lead to direct costs such as fines, legal
expenses, or ransom payments. Indirect costs include loss of business and
the resources required to remediate the attack.
• Example: The Equifax breach in 2017 exposed the personal data of 147
million people, leading to over $700 million in settlements.
• Reputation Damage: Breaches erode public trust, and customers may
abandon organizations that have not properly safeguarded their data.
Reputation recovery can be slow and expensive.
• Example: Target’s 2013 breach, which affected 40 million customers,
resulted in significant brand damage.
• Operational Disruption: A breach can cause disruptions to day-to-day
operations. Services may be taken offline, critical data may be encrypted,
or systems may be compromised, all of which hamper productivity.
• Example: A ransomware attack might lock essential systems, bringing
operations to a halt until recovery procedures are executed.
• Legal & Regulatory Penalties: Non-compliance with regulatory frameworks
(e.g., GDPR, HIPAA) can lead to severe penalties.
• Example: The British Airways breach resulted in a £183 million fine due to
data protection violations under GDPR.
Investing in Security and Establishing a
Baseline
• Investing in Security:
• Organizations must commit both time and
resources to building a comprehensive cyber-
security strategy. Investment in security
ensures that the organization can defend
against emerging threats, meet regulatory
requirements, and minimize the business
impact of potential breaches.
• Key areas for security investment include:
• People: Skilled cybersecurity professionals are the
first line of defense. This includes roles like SOC
analysts, incident responders, and threat hunters.
• Processes: Organizations need robust incident
response plans, threat intelligence gathering, and
risk management procedures.
• Technology: Security tools such as SIEM systems,
firewalls, encryption, intrusion detection systems
(IDS), and endpoint protection software are
necessary for proactive threat management.
• Example: A company may allocate part of its
IT budget to invest in endpoint protection
software like CrowdStrike and next-gen
firewalls to enhance its defense against
malware.
Establishing a Security Baseline:
• Establishing a security baseline means
assessing the current state of security within
the organization and creating a point of
reference for ongoing improvements. The
baseline provides a structured approach to
security, helping organizations recognize
vulnerabilities and track their security posture
over time.
• Steps for Establishing a Baseline:
• Risk Assessment: Identifying and evaluating the risks to
the organization’s assets (e.g., data, systems) and
operations.
– Example: Assessing the risk of a data breach from weak
password policies or outdated software.
• Security Audits: Conducting audits to evaluate the
effectiveness of current security measures and identify
gaps in defense.
– Example: A security audit of a cloud service provider might
reveal gaps in encryption or access control that need to be
addressed.
• Benchmarking: Comparing the organization's security
measures with industry standards (e.g., NIST, ISO 27001).
– Example: A company might compare its security posture
against CIS Controls, which outlines key security best practices.
Fundamental Security Capabilities and
Industry Threat Models
• Fundamental Security Capabilities:
• Security capabilities are essential components that
organizations need to protect against threats and
safeguard data.
• Access Control: Restricting access to systems and data
based on roles and the principle of least privilege.
– Example: Implementing multi-factor authentication (MFA) to
ensure only authorized users can access sensitive data.
• Encryption: Protecting data by converting it into a secure
format that can only be decrypted by authorized parties.
– Example: Using AES-256 encryption for data stored in the
cloud to protect it from unauthorized access.
• Intrusion Detection and Prevention: Systems that
detect suspicious activities and either alert
administrators or actively block malicious actions.
• Example: Snort IDS detecting unusual network
traffic and generating an alert for potential
intrusions.
• Incident Response: Having a predefined process for
detecting, analyzing, and responding to security
incidents.
• Example: A DDoS attack is detected, and the
incident response team takes steps to mitigate the
attack by rerouting traffic.
• Industry Threat Models:
• These models help organizations understand
potential threats specific to their industry and
design defenses accordingly.
• MITRE ATT&CK Framework: A comprehensive
framework for mapping adversary tactics,
techniques, and procedures (TTPs) used in
cyberattacks.
– Example: A financial institution might use MITRE
ATT&CK to map out tactics used in ATM skimming
attacks and develop defenses.
MITRE ATT&CK Framework - Simple Explanation
🔹 What is it?
MITRE ATT&CK is like a big cheat sheet that helps
cybersecurity experts understand how hackers attack systems.
🔹 Why is it useful?
It lists and explains the tricks hackers use so that companies
can prepare defenses against them.
🔹 How does it work?
It organizes cyberattacks into three main parts:
1. Tactics – What the hacker is trying to do (e.g., stealing data).
2. Techniques – How they do it (e.g., phishing emails, malware).
3. Procedures – The specific steps they take.
Example:
A company can use MITRE ATT&CK to analyze
past cyberattacks and improve their security
by blocking the hacker’s known tricks.
• 💡 Analogy: Think of it like a playbook that
shows all the moves hackers might use, so
cybersecurity teams can stay ahead of them!
• STRIDE: A threat modeling methodology that
identifies common security threats in system
design (Spoofing, Tampering, Repudiation,
Information Disclosure, Denial of Service,
Elevation of Privilege).
• Example: In designing a web application,
STRIDE helps identify risks such as session
hijacking or unauthorized data access.
Standards, Guidelines, and Frameworks
• Standards, guidelines, and frameworks
provide structured approaches to
implementing security practices.
• ISO/IEC 27001: An international standard for information security
management systems (ISMS) that helps organizations establish,
implement, and maintain a security program.
• Example: A company might become ISO 27001 certified to
demonstrate its commitment to information security best practices.
• NIST Cybersecurity Framework (CSF): A flexible framework that helps
organizations manage and reduce cybersecurity risks, consisting of five
key functions: Identify, Protect, Detect, Respond, and Recover.
• Example: A healthcare provider follows NIST CSF to ensure
compliance with HIPAA regulations and improve its cybersecurity
posture.
• CIS Controls: A set of prioritized cybersecurity best practices that help
organizations defend against the most common cyberattacks.
• Example: A small business uses CIS Controls to establish foundational
security measures like network segmentation and endpoint
protection.
ISO/IEC 27001 (Information Security Management
System - ISMS)

• What is it? A global standard that helps


organizations keep their information safe by
following strict security rules.
• Why is it important? Companies that follow
this standard show they are serious about
cybersecurity and protecting sensitive data.
• Example: A company gets ISO 27001 certified
to prove they use the best security practices
to protect customer data.
NIST Cybersecurity Framework (CSF)
• What is it? A guideline created to help businesses
understand and reduce cybersecurity risks.
• Key Functions:
• Identify – Know what needs protection.
• Protect – Put security measures in place.
• Detect – Find cyber threats early.
• Respond – Take action when an attack happens.
• Recover – Fix the damage and improve security.
• Example: A hospital follows NIST CSF to protect
patient records and comply with health data laws
like HIPAA.
CIS Controls (Critical Security Controls)

• What is it? A list of important security steps


to protect businesses from hackers.
• Why use it? It prioritizes the most effective
defenses so even small businesses can
improve security.
• Example: A small company follows CIS
Controls to set up firewalls, secure
passwords, and antivirus software to block
cyber threats.
Vulnerabilities, Risk & Business Challenges

• Vulnerabilities:
• Vulnerabilities are weaknesses in systems,
applications, or networks that can be exploited by
attackers. These vulnerabilities can be technical
(e.g., unpatched software) or human-related (e.g.,
social engineering attacks).
• Example: A vulnerability in Windows SMB protocol
(exploited by EternalBlue in the WannaCry attack)
allows attackers to spread malware across
networks.
Risk:
Risk is the likelihood that a threat will exploit a
vulnerability and the resulting impact. Risk
management involves identifying, assessing, and
mitigating risks to an acceptable level.
Example: A financial institution might assess the
risk of a phishing attack targeting employees and
implement security training to reduce the
likelihood of the attack being successful.
Business Challenges in Security Operations
🔹 Alert Overload – Too many security alerts make it hard to find real
threats.
🔹 Skill Shortage – Lack of trained cybersecurity professionals.
🔹 Incident Response Delays – Slow detection & response increase
damage.
🔹 Integration Issues – Security tools from different vendors may not
work well together.
🔹 Limited Budget – High costs of security tools & staff.
🔹 False Positives – Security systems may flag harmless activities as
threats.
🔹 Shadow IT – Employees using unauthorized apps & devices.
🔹 Keeping Up with Threats – Hackers constantly evolve their tactics.
Business Challenges:
Balancing the need for robust security with business
goals is one of the most significant challenges.
Security measures can sometimes hinder business
processes or incur additional costs, making it difficult
to find a balance between operational efficiency and
protection.
Example: Enforcing strict security policies on mobile
devices may impact employee productivity, but it’s
necessary to protect sensitive data from being
accessed or leaked.
THE END

You might also like