GUÍA DE
CIBERDEFENSAORIENTACIONES PARA EL DISEÑO, PLANEAMIENTO, IMPLANTACIÓN Y DESARROLLO DE UNA CIBERDEFENSA MILITAR
56
a CyOC requires security orchestration services (SOAR,
cyber threat hunting, advanced deception platforms and command and control systems while a NOC requires tools to control and monitor network operation.
348.
Security event management can be grouped into three echelons the first echelon comprising prevention activities against failures and cyber attacks the second echelon comprising standard ongoing cyber attack mitigation activities (real-time monitoring, event correlation,
indicators of compromise, cyber situational awareness, dynamic risk management, early warning and help desk the third echelon comprises ex-post analysis and advanced threat mitigation activities (forensic
analysis, rapid reaction teams, malware analysis and APT early warning).
Share with your friends: