Figure Credits
Cover image Sdecoret/Shutterstock
Figure 1-1, video posted by Anonymous on YouTube © 2020 Scripps Media, Inc
Figure 1-18, part of the MITRE ATT&CK matrix for Enterprise © 2015–2021, The MITRE Corporation
Figure 1-19, chaining together attack behavior using ATT&CK modeling © 2015–2021, The MITRE Corporation
Figure 2-5, Rapid7’s Nexpose Vulnerability Scanner © Rapid7
Figure 2-6, Cisco Firepower passive vulnerability data © Cisco Systems
Figure 2-7, Cisco reputation block page © Cisco Systems
Figure 2-8, Google’s reputation warning banner ©2020 Google
Figure 2-13, raised floor tile courtesy of Alibaba.com
Figure 2-14, sample SOC layout courtesy of Cisco Systems
Figure 2-26, Figure 5-16, SPLUNK Dashboard example © 2005–2020 Splunk, ...
Get The Modern Security Operations Center: The People, Process, and Technology for Operating SOC Services now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.