Index
A, B
ATT&CK framework
Black Vine matrix
collection tactics
command and control tactics
credential access techniques
Deep Panda techniques
defense evasion techniques
discovery tactics
execution process
SSH process
tactics
techniques
Deep Panda/Black Vine
navigator tool
steps of
tactics framework
C
Common Vulnerability Exposures (CVEs)
Common Vulnerability Scoring System (CVSS)
Continuous monitoring
commercial solutions
endpoint protection
full packet capture
components of
connection map
data link layer
Elasticsearch database
GitHub
graphical section
Internet protocol layer
Moloch sessions screen
open source solution
Payload details
sessions page
TLS data
IDS
SeeIntrusion detection systems (IDS)
metrics
network
objective of
Continuous monitoring processes
Cybersecurity program
Cyber ...

Get Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.