dc.description.abstract |
In counteraction to the increasing threat of
cyber terrorism, the modeling to be predicted in
guessing the predictive models for estimating the
incidence of cyber-attacks for enterprise network in
Myanmar are seriously needed. Although we need
these models, there is no record of attacks,
defenseless, outcome and threat to utilize the
developing predictive models and authentication. The
main purpose of this research is to determine
whether SOC (Security Operation Center) manager
uses cyber security model by using SOC results
figures to prepare further cyber defense and incident
response plan. The goal of this study was achieved by
conducting experiments on various cyber-attacks
occurred in security operation center of Industrial
Control System (ICS).Blue team, Incident Handling, SOC,
Cyber Security Model, Vulnerabilities, Threats,
Attack. |
en_US |