Figure Credits

Cover image Sdecoret/Shutterstock

Figure 1-1, video posted by Anonymous on YouTube © 2020 Scripps Media, Inc

Figure 1-18, part of the MITRE ATT&CK matrix for Enterprise © 2015–2021, The MITRE Corporation

Figure 1-19, chaining together attack behavior using ATT&CK modeling © 2015–2021, The MITRE Corporation

Figure 2-5, Rapid7’s Nexpose Vulnerability Scanner © Rapid7

Figure 2-6, Cisco Firepower passive vulnerability data © Cisco Systems

Figure 2-7, Cisco reputation block page © Cisco Systems

Figure 2-8, Google’s reputation warning banner ©2020 Google

Figure 2-13, raised floor tile courtesy of Alibaba.com

Figure 2-14, sample SOC layout courtesy of Cisco Systems

Figure 2-26, Figure 5-16, SPLUNK Dashboard example © 2005–2020 Splunk, ...

Get The Modern Security Operations Center: The People, Process, and Technology for Operating SOC Services now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.