This site is under construction. All information available is for learning purposes only. Thank you.
SOC WMS (Security Operations Center Workflow Management System) or SOAR (Security Orchestration, Automation, and Response) products focus on automating workflows for Security Operations Centers. Here are some notable vendors:
Cisco SecureX: A unified platform that integrates security tools and automates workflows for enhanced incident response.
Cisco CloudCenter Action Orchestrator: Simplifies workflow creation with a user-friendly drag-and-drop designer.
CyberSponse: Offers a platform for automating security incident response processes.
IBM Resilient Systems: A solution that helps organizations manage and respond to incidents effectively.
Proofpoint Threat Response: Automates incident response and enhances threat intelligence sharing.
Swimlane: Provides a security automation platform designed to streamline security operations and improve incident response times.
External or Removable Media Attacks:
Attacks executed from removable media (e.g., USB flash drives) that spread malicious code onto systems.
Attrition Attacks:
Brute-force attacks aimed at compromising, degrading, or destroying systems, networks, or services. This includes DDoS attacks designed to impair access to services or applications.
Web Attacks:
Attacks executed against websites or web-based applications, such as:
Cross-Site Scripting (XSS): Used to steal credentials.
Redirects to exploit sites that install malware.
Email Attacks:
Attacks carried out via email messages or attachments, including:
Malicious exploit code disguised as document attachments.
Links to compromised websites within email body content.
Impersonation Attacks:
Involves replacing benign entities with malicious ones, such as:
Spoofing.
Man-in-the-Middle (MITM) attacks.
Rogue wireless access points (APs).
SQL injection attacks involving impersonation.
Improper Usage Incidents:
Occur when authorized users violate acceptable usage policies, leading to risks such as:
Installation of file-sharing software that results in data loss.
Engaging in illegal activities on company systems.
Loss or Theft of Equipment:
Involves the loss or theft of devices (e.g., laptops, smartphones) or media (e.g., authentication tokens).
Other Attacks:
Any attacks that do not fall into the aforementioned categories.