چكيده به لاتين
Today, organizations are subject to cybercrime attacks. Any attempt to access, manipulate, disable, eliminate integrity, confidentiality, security, or access to an application's data or a computerized cyber threat system. Potential cyber threats that may lead to unwanted results, such as damage to a system or organization, are threatened. These threats may have internal or external origins and may originate from individuals or organizations. Increasing the number of online crimes and financial damage caused by them, human resource costs, and the availability of service exclusion, it is possible to carry out complex attacks without the need for extensive knowledge, including those that have made organizations a critical issue. .
Network security is a process in which a network is secured against a variety of internal and external threats. To ensure security, it is first necessary to identify the part to be protected. Then examine how threats are. After that, the options that will protect your assets in a cost-effective way will be implemented. Finally, the re-review and continuation of this process, and its reinforcement, should be repeated in the event of a defect.
The purpose of this thesis is to provide a minimum cost framework for monitoring network components to deal with cyber threats to moderate organizations using scientific comparisons (decision-making methods) of open source tools. In fact, we plan to provide a security framework by comparing open source tools with the main components of network security for use in security operations centers.
Keywords: Security Operations Center, main components of network security, cyber attacks