© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2024
M. J. Haber, D. RollsIdentity Attack Vectorshttps://doi.org/10.1007/979-8-8688-0233-1_10

10. Indicators of Compromise

Morey J. Haber1   and Darran Rolls2
(1)
ORLANDO, FL, USA
(2)
AUSTIN, TX, USA
 
There are plenty of solutions that can help provide indicators of compromise (IoCs). Some will highlight the IP address of an asset, the malware detected, or even unusual patterns in user behavior and password authentication attempts. All of these can be mapped back to the Venn diagram of cybersecurity discussed earlier in the book. The goal of any IoC is to identify when something is inappropriate in an environment, what evidence supports the anomaly, and potentially ...

Get Identity Attack Vectors: Strategically Designing and Implementing Identity Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.