A Comparison of SOC Models for Today’s Need of Monitoring & Detecting the Latest Cyber Threats