Skip to main content

Command Palette

Search for a command to run...

Security Operation Center

Updated
2 min read
Security Operation Center

Security Operation Centre (SOC)

SOC is a team of cyber-security dedicated to monitoring and analysing an organization’s infrastructure 24/7 and the main responsibility of the SOC team is to respond to potential or current breaches. Also, the team is responsible for scanning the security systems in real-time.

  • A good SOC operator is always looking to expand the company’s security visibility by maintaining an extensive inventory of all IT assets.

  • When a cyberattack occurs, the SOC acts as the digital front line, responding to the security incident with force while also minimizing the impact on business operations.

Cyber Security

Cyber security is also called computer security and information technology security.

Cyber security is the protection of computer systems and networks from attacks by malicious attackers. This may result in unauthorized information disclosure, theft or damage of hardware, software, and data.

Cyber security is important because smartphones, computers and the internet are now such a fundamental part of modern life, that it's difficult to imagine how we'd function without them. This will lead to many digital attacks associated with them.

Information Security

Information security is also called InfoSec. It is not only about securing information from unauthorized access to the data.

Information security is the practice of preventing unauthorized access, use, disclosure, disruption, modification, or destruction of information.

In short, information security is the practice of protecting information by mitigating information risks and it is a part of information risk management.

Difference between cyber security and information security

The terms Cyber security and information security are used interchangeably. As they both are responsible for the security and protection of the computer system from threats and information breaches.

Examples of Cyber security are:

  • Network security

  • Application Security

  • Cloud Security

  • Critical infrastructure

Examples of information security are:

  • Procedural controls

  • Access controls

  • Technical controls

  • Compliance controls

8 views

More from this blog

shesecures

15 posts

Welcome to SheSecures.in!

Dive into the world of cybersecurity with expert tips, latest threats, practical advice, and industry insights to safeguard your digital life. Stay informed, stay secure!