+ All Categories
Home > Documents > NOC and SOC _

NOC and SOC _

Date post: 18-Nov-2014
Category:
Upload: shivpreetsandhu
View: 106 times
Download: 2 times
Share this document with a friend
19
NOC & SOC SUBMIT BY : Vivek Hans Jiwateshwar Singh
Transcript
Page 1: NOC and SOC _

NOC & SOC

SUBMIT BY :

Vivek Hans

Jiwateshwar Singh

Page 2: NOC and SOC _

NOC

A network operations center (NOC) is a place from which administrators supervise, monitor and maintain a telecommunications network. Large enterprises with large networks as well as large network service providers typically have a network operations center, a room containing visualizations of the network or networks that are being monitored, workstations at which the detailed status of the network can be seen, and the necessary software to manage the networks.

Page 3: NOC and SOC _

WHY NOC???

Increase Network Availability Decrease Staffing & Training Requirements Optimize your Network’s Bandwidth Utilization

and Performance Improve Productivity while Decreasing

Operational Costs

Page 4: NOC and SOC _

WHAT IT PROVIDES….

24x7x365 Monitoring Problem Detection, Resolution and Notification Performance Management Network Optimization Software Maintenance Upgrades Configuration Backups Trouble Tickets, Status, Performance & Utilization

Reports are all available via the Internet

Page 5: NOC and SOC _

Additional Services

Information Technology Infrastructure

– Network Design and Implementation– Server Configuration– Internet Access– Firewalls– Virtual Private Networks– Wireless Access

Web Hosting & Page Design

SOHO Cable/DSL and Network Installations

Page 6: NOC and SOC _

SOC

A Security Operations Center (SOC) is a centralized unit in an organization that deals with security issues, on an organizational and technical level.

It attempts to prevent unauthorized access and manage security related incidents using processes and procedures

Page 7: NOC and SOC _

SOC……

Mission is risk management through centralized analysis using the combined resources consisting of personnel, dedicated hardware and specialized software

These systems operate constantly. These resources offer continuous risk analysis and guarantee protection against intrusion

Page 8: NOC and SOC _

Possible SOC services

Proactive analysis & system management Security device management Reporting Security alert DDOS mitigation Security assessment Technical assistance

Page 9: NOC and SOC _

Proactive analysis and system management

This security system provides proactive analysis of the systems and security devices of a system (intrusion detectionsystems /IDS , intrusion prevention systems/IPS, firewalls, etc).

This anti-intrusion system offers centralized management of security. Personnel need only concern themselves with the functions of

monitoring tools, rather than the complexity of any device under scrutiny.

Tools used by the SOC must be is scalable. For example, adding a new IDS to those already existing.

The SOC also performs policy management, including remote policy management.

Configuration of devices and security policies must be constantly updated as the system grows and evolves

Page 10: NOC and SOC _

Security device management

The security device management (SDM) service is composed of the following elements:

Fault management The main objective of fault management is to ensure

the continuous operation of the security infrastructure. The activity includes:

- Monitoring of client security devices - Fault Detection and Signaling - Fault Reporting - Corrective action determination - Corrective action implementation - System recovery (if necessary)

Page 11: NOC and SOC _

Security device management

Configuration management The main objective of configuration management is to ensure the

continuous enforcement of firewall rules tailored to customer needs. It applies to all equipment managed by the SOC and includes data packet discard / acceptance rules between an external source and an internal destination (or vice versa) based on:

– Source address.– Destination address.– Network protocol.– Service protocol.– Traffic log.

Configuration management may be performed remotely (remote configuration management)

Page 12: NOC and SOC _

Reporting

Logs generated by various system components are consolidated and reformatted into an easily understandable report for the customer. This reporting is particularly important because, besides providing details of any possible intrusion by unauthorized parties or accidents, may also allow the customer to take preventative action.

Page 13: NOC and SOC _

Security Alert

The security alert service is designed to notify customers in timely fashion of the discovery of new vulnerabilities in such a way that countermeasures can be effected in time upon an attack to mitigate or negate the impact of the attack.

Page 14: NOC and SOC _

Security assessment

It Includes :- Vulnerability assessment

– The vulnerability assessment searches for known vulnerabilities of systems and software installed. This is carried out through specific technologies that are configured and customized for each assessment

Penetration test– The penetration test is performed to isolate and exploit known or

unknown vulnerabilities of systems, services and installed web applications. It attempts to quantify the threat level represented on each system and the impact. This activity is carried out either through a number of technologies that are configured and customized per assessment, or manually for each service, system, and application.

Page 15: NOC and SOC _

Distributed denial of service (DDOS) mitigation

The DDOS Mitigation attempts to mitigate the effects of a denial of service attack directed at a critical function of a client’s web infrastructure. It receives notification of an attack on a client service. Countermeasures are activated and evaluated. Traffic is ‘cleaned’ and re-re-routed. An ‘end-of-attack notification’ is reported and logged.

Page 16: NOC and SOC _

Penetration test

The penetration test is performed to isolate and exploit known or unknown vulnerabilities of systems, services and installed web applications. It attempts to quantify the threat level represented on each system and the impact. This activity is carried out either through a number of technologies that are configured and customized per assessment, or manually for each service, system, and application.

Page 17: NOC and SOC _

Technical assistance

The SOC can provide general technical assistance for any issue regarding system operation, system violations, system update, security hardware and software update and configuration. Technical assistance can be provided remotely or on-site depending on the level of service.

Page 18: NOC and SOC _

Difference B/w SOC & NOC

NOC’s purpose has always been to ensure "power, ping, and pipe" to computing resources and is critically measured on uptime Service Level Agreements (SLAs). Conversely, the SOC’s purpose has been to "protect, detect, react, and recover" and is critically measured on response time SLAs. Combined, these Operations serve as both central nervous and immune systems to ensure the availability and integrity of IT assets

Page 19: NOC and SOC _

THANKS


Recommended