Security Operation Center

Security Operation Centre (SOC)
SOC is a team of cyber-security dedicated to monitoring and analysing an organization’s infrastructure 24/7 and the main responsibility of the SOC team is to respond to potential or current breaches. Also, the team is responsible for scanning the security systems in real-time.
A good SOC operator is always looking to expand the company’s security visibility by maintaining an extensive inventory of all IT assets.
When a cyberattack occurs, the SOC acts as the digital front line, responding to the security incident with force while also minimizing the impact on business operations.
Cyber Security
Cyber security is also called computer security and information technology security.
Cyber security is the protection of computer systems and networks from attacks by malicious attackers. This may result in unauthorized information disclosure, theft or damage of hardware, software, and data.
Cyber security is important because smartphones, computers and the internet are now such a fundamental part of modern life, that it's difficult to imagine how we'd function without them. This will lead to many digital attacks associated with them.
Information Security
Information security is also called InfoSec. It is not only about securing information from unauthorized access to the data.
Information security is the practice of preventing unauthorized access, use, disclosure, disruption, modification, or destruction of information.
In short, information security is the practice of protecting information by mitigating information risks and it is a part of information risk management.
Difference between cyber security and information security
The terms Cyber security and information security are used interchangeably. As they both are responsible for the security and protection of the computer system from threats and information breaches.
Examples of Cyber security are:
Network security
Application Security
Cloud Security
Critical infrastructure
Examples of information security are:
Procedural controls
Access controls
Technical controls
Compliance controls




