Browse > Article
http://dx.doi.org/10.33778/kcsa.2021.21.3.039

Security Operation Dashboard Design by Blockade-Detection-Response  

Han, Choong-Hee (전력거래소 안전관리실/정보보안팀)
Publication Information
Abstract
Standardization of the security operation dashboard is essential for efficient operation of security operation center. The security operation dashboard should be configured so that it is widely used by security operation workers who have to live together 24 hours a day, 365 days a year. In addition, it must be able to comprehensively express the business activities of the security operation center. In addition, it should be possible to easily explain the business activities of the security operation center. Therefore, in this paper, we would like to explain the design of a security control dashboard based on blockade, detection, and response that is actually applied to case organizations in the power sector. Through this, it is intended to reduce the effort and time required for configuring a custom dashboard for VIPs, and contribute to the efficient operation of the security operation center.
Keywords
Security operation center; Dashboard; Blockade-Detection-Response;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Rasim Alguliyev, Yadigar Imamverdiyev, Lyudmila sukhostat, 'Cyber-physical systems and their security issues', Institute of Information Technology, Azerbaijan National Academy of Sciences, 0166-3615/2018 Elsevier.
2 Tae-Woong Seo, 'An Analysis of Vulnerabilities and Performance on the CCTV Security Monitoring and Control', Journal of Multimedia, 15(1), Jan, 2012.
3 Hanbitmedia, "Network security system construction and security control",2016, pp. 38-42
4 Suk-woo Hyun, "A Study of Effectiveness of the Improved Security Operation Model Based on Vulnerability Database", Korea Institute Of Information Security And Cryptology, 2019.10, 1167-1177(11 pages)
5 Woo-Jin Jo, "A log visualization method for network security monitoring", Korean Institute Of Smart Media, 2018, 70 - 78 (9 pages)
6 Cyril Onwobiko, 'CoCoa: An Ontology for Cybersecurity Operations Centre Analysis Process', Intelligence & Security Assurance, E-Security Group, London, UK. 2018.
7 Charles Feng, Shuning Wu, Ningwei Liw, 'A User- Centric Machine Learning Framework for Cyber Security Operation Center', ZhonDu Tecnologies, Symantec Corporation, 978-1-5090-6727/17, IEEE, 2017.
8 Jeon Sang June, "Design and Evaluation Security Control Iconology for Big Data Processing", JOURNAL OF PLATFORM TECHNOLOGY, 2020.12, pp. 38-46.   DOI
9 Han ChoongHee, 'A study for Information Security Risk Assessment Methodology Improvement by blockade and security system level assessment ', Korea Information Assurance Society, vol 20-4, pp.187-196, Oct, 2020.
10 Infothebooks, "Security Control Practice Guide for Nurturing Next-Generation Information Security Talents", 2017, pp. 45-48.
11 Sitaram Kowtha, Laura A. Nolan, Rosemary A. Daley, 'Cyber Security Operation Center Characterization Model and Analysis', Johns Hopkins University, Applied Physics Laboratory, 978-1-4673-2709-1/12, IEEE, 2012.
12 Jin_Young Jung, 'Security Management Automation Method Using Artificial Intelligence in Financial Sector', KonKuk Univ, Master's Thesis, Feb, 2018.
13 Eui-yeon Jung , 'A Study on the Integrated Security Monitoring &Control in Financial Investment Industry Computer Networks', Korea Information Processing Society, 19-2, Feb, 2012.
14 Natalia Miloslavskaya, 'Network Security Intelligence Center as a combination of SIC and NOC', National Research Nuclear University MEPhI, 1877-0509/2018 Elsevier.
15 Kim, MinJun, 'A study on the implementation of white-list intrusion detection system on control networks', Department of Industry Security, Graduate School, Kyonggi Univ, Jun, 2011.
16 Gil Sun, Yu, 'A Study on the Cyber Security monitoring Detection and Response', Department of Digital Forensics, The Graduate School of Hanseo University, August, 2018.