ResearchSpace

The evolution of cyber threats in the South African context

Show simple item record

dc.contributor.author Veerasamy, Namosha
dc.date.accessioned 2023-01-03T08:55:22Z
dc.date.available 2023-01-03T08:55:22Z
dc.date.issued 2022-03
dc.identifier.citation Veerasamy, N. 2022. The evolution of cyber threats in the South African context. <i>Journal of Information Warfare.</i> http://hdl.handle.net/10204/12567 en_ZA
dc.identifier.issn 1445-3312
dc.identifier.issn 1445-3347
dc.identifier.uri http://hdl.handle.net/10204/12567
dc.description.abstract A Cybersecurity Operation Centre (SOC) is a centralized hub within an organisation that houses people, processes, and technologies aimed at continuous monitoring of the organization’s assets in order to prevent, detect, analyse, and respond to cybersecurity incidents against that organisation. SOCs are critical to the collection, analysis, and response to cybersecurity events and incidents faced by an organisation. This article discusses the architecture of an SOC that enables quick and timely responses to events and incidents. Firstly, the article describes an architecture of the SOC, the SOC’s processes, personnel, and technologies. Secondly, the article discusses what type of information and logs should be collected, analysed, and interpreted. Lastly the article discusses how to handle an incident through the six stages of incident response. en_US
dc.format Abstract en_US
dc.language.iso en en_US
dc.relation.uri https://www.jinfowar.com/tags/threat-actors en_US
dc.relation.uri https://www.jinfowar.com/journal/volume-21-issue-1/evolution-cyber-threats-south-african-context en_US
dc.source Journal of Information Warfare en_US
dc.subject Cyber threats en_US
dc.subject Next-Generation threats en_US
dc.subject Threat actors en_US
dc.title The evolution of cyber threats in the South African context en_US
dc.type Article en_US
dc.description.pages 91-104 en_US
dc.description.note © Copyright 2022 Journal of Information Warfare. All Rights Reserved. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website: https://www.jinfowar.com/journal/volume-21-issue-1/evolution-cyber-threats-south-african-context en_US
dc.description.cluster Defence and Security en_US
dc.description.impactarea Inf and Cybersecurity Centre en_US
dc.identifier.apacitation Veerasamy, N. (2022). The evolution of cyber threats in the South African context. <i>Journal of Information Warfare</i>, http://hdl.handle.net/10204/12567 en_ZA
dc.identifier.chicagocitation Veerasamy, Namosha "The evolution of cyber threats in the South African context." <i>Journal of Information Warfare</i> (2022) http://hdl.handle.net/10204/12567 en_ZA
dc.identifier.vancouvercitation Veerasamy N. The evolution of cyber threats in the South African context. Journal of Information Warfare. 2022; http://hdl.handle.net/10204/12567. en_ZA
dc.identifier.ris TY - Article AU - Veerasamy, Namosha AB - A Cybersecurity Operation Centre (SOC) is a centralized hub within an organisation that houses people, processes, and technologies aimed at continuous monitoring of the organization’s assets in order to prevent, detect, analyse, and respond to cybersecurity incidents against that organisation. SOCs are critical to the collection, analysis, and response to cybersecurity events and incidents faced by an organisation. This article discusses the architecture of an SOC that enables quick and timely responses to events and incidents. Firstly, the article describes an architecture of the SOC, the SOC’s processes, personnel, and technologies. Secondly, the article discusses what type of information and logs should be collected, analysed, and interpreted. Lastly the article discusses how to handle an incident through the six stages of incident response. DA - 2022-03 DB - ResearchSpace DP - CSIR J1 - Journal of Information Warfare KW - Cyber threats KW - Next-Generation threats KW - Threat actors LK - https://researchspace.csir.co.za PY - 2022 SM - 1445-3312 SM - 1445-3347 T1 - The evolution of cyber threats in the South African context TI - The evolution of cyber threats in the South African context UR - http://hdl.handle.net/10204/12567 ER - en_ZA
dc.identifier.worklist 26317 en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record