SlideShare a Scribd company logo
Cyber Defense
Continuum.
Main
Characters.
Supporting
Characters.
Schoolboy
Owners
Gardener
Forensic team
Mailman
Analyst
Thief
SWAT
Lorem ipsum dolor sit amet, consectetur adipiscing
elit, sed do eiusmod tempor incididunt ut labore et
dolore magna aliqua. Ut enim ad minim veniam, quis
nostrud exercitation ullamco laboris nisi ut aliquip ex
ea commodo consequat.
Duis aute irure dolor in reprehenderit in voluptate velit
esse cillum dolore eu fugiat nulla pariatur.
System auto-recognizes trusted insider.
Plot: Schoolboy comes home. Fence camera picks
up via biometrics, e.g. face recognition.
Result: System auto-recognizes him as a trusted
insider. No incident means no response required.
Lorem ipsum dolor sit amet, consectetur adipiscing
elit, sed do eiusmod tempor incididunt ut labore et
dolore magna aliqua.
Ut enim ad minim veniam, quis nostrud exercitation
ullamco laboris nisi ut aliquip ex ea
commodo consequat.
Sources:
1. International Data Corp (IDC), “U.S. Residential Landline Voice Displacement Forecast, 2016–2020, May 2016.
2. Ovum. Market Landscape: Enterprise Mobility Management 2016.
3. Ovum Trends to Watch: Employee Mobility, Feb 2016; Survey results Enterprise Mobility Ovum 2015/16.
4. Smartphone Connections Forecast 2016 – 21, Aug 2019 Ovum-TMT Intelligence, 2016.
5. Abbreviated disclaimer: Results based on third-party study.
6. Network rankings based on RootMetrics® US National and State RootScore® Reports: 2H 2016. Performance rankings of four mobile networks rely on scores calculated from random
samples across all available network types. Your experience may vary. The RootMetrics award is not an endorsement of Verizon. Visit www.rootmetrics.com for more details.
7. Gartner April 11, 2020 “Critical Capabilities for Wireline Telecom Services US”.
2020 North American Frost & Sullivan Award for Market Leadership.
J.D. Power ranks Verizon the top wireless network in five regions in the U.S. Achieved highest score from J.D. Power in all three quality categories: calling, messaging and data. For the seventeenth time in a row, Verizon has received more awards than any other provider in the J.D. Power Wireless Network Quality
Study.
Detection
Network Threat Advanced Analytics
MSS – Analytics
Managed SIEM
Advanced SOC
Analyst has different options to respond:
Data collection &
storage and
intelligence enrichment
Data Intelligence Advanced
analytics
Initial
investigation
Incident
response
Mitigation Emergency
response
Investigative
response
Threat analysis /
incident detection*
USP
(Unified
Security
Portal)
Customer
tools
Security and
end-point
management
Advanced
CERT
“Threat
Intel and
Response”
Incident response
and mitigation
Investigative
response-ProServ
security
Response
Data Raw data enriched Adv. analytics
Analyst
Incident triage
Incident
creation
End-point
Secure house
Notify owners
MSS-prem
(MSS – Premises)
Call CSIRT
Call CERT
Services
Incident workflow
SIEM / SOC
NTAA (Network Threat
Advanced Analytics)
Anomaly-based
monitoring & analytics
of NetFlow traffic on
Verizon platform into USP;
SOC support.
Verizon Platform.
USP (SOC support)
MSSA (MSS Analytics)
Standard monitoring 
analytics on Verizon
platform into Verizon
SOC / USP.
Verizon Platform.
Verizon SOC / USP
MSIEM (Managed SIEM)
Monitoring  analytics
on customer SIEM into
Verizon SOC / USP.
Customer SIEM
Verizon SOC / USP
ASOC (Advanced SOC)
Tailored monitoring 
analytics from customer
SIEM into customer
dedicated
Verizon ASOC / IM mgmt
platform.
Customer SIEM
Cust. dedicated
Verizon ASOC / IM
Summary.
Cyber Defense Continuum.
Contractor.
Trusted actor gone wrong.
Schoolboy.
Trusted actor.
Street camera picks up school bus.1
Fence camera picks up schoolboy
via face recognition.
2
System recognizes schoolboy as trusted
insider and does not create an incident.
3
No incident means
no response required.
3
2
4
1
ResponseDetection
Analyst recognizes trusted 3rd party.
Plot: Mailman drops off a parcel at the mailbox
behind the fence. Analyst recognizes trusted
3rd party.
Result: An incident is identified but initial triage
shows there is no threat. Owners are just notified.
Mailman.
Accept risk.
Detection
Mailman
Boy
Analyst
Owner
Response
1 Street camera picks up postal truck.
Fence camera picks up image of
mailman on the way in - and on the
way out again.
2
3
Camera inside the house does not show
any activity.
4 The system aggregates all information.
5
Analyst evaluates all information,
determines that it is a trusted 3rd party,
and creates an incident (but no threat)
that only requires notification.
2
3
4
6
1
Thief.
Immediate threat.
Untrusted 3rd party triggers incident - SWAT stops
thief before damage.
Plot: Person looking like a thief gets over the fence
using a ladder.
Result: Analyst recognizes the immediate threat
and calls in the SWAT team. The SWAT team
manages to arrest the thief before he can get into
the house.
Trusted 3rd party goes rogue.
Plot: A Gardener was hired to do a
landscaping job around the house (and
behind the fence). He abuses/exceeds his
privileges by breaking into the actual house
where he is looking for jewelry.
Result: Inside camera picks up the
Gardener and analyst remotely looks the
door to the bedroom (with safe inside). At
the same time, he alerts the SWAT team that
manages to arrest the Gardener inside the
house / before he can get away. A breach
has happened but nothing was stolen and
the Owners and Security company do a
forensic investigation as to how to improve
security posture.
Detection
Detection
Thief
Contractor
Owner
Owner
Response
Response
Street camera picks up suspiciously
looking untrusted 3rd party.1
Street camera and fence camera see
Gardener getting onto the premises.1
Fence camera picks up image of thief
getting over the fence.2
2
Gardener breaks into the house and
inside camera monitors this activity.
System aggregates all information.3
3
Ut enim ad minim veniam, quis nostrud
exercitation ullamco laboris nisi ut aliquip.
Analyst escalates and calls in the
SWAT team.
4
6
SWAT team manages
to arrest the thief
before he can get
into the house.
2
3
2
3
4
4
5
1
1
Analyst
Analyst
System
(triggered by
Analyst)
only notifies
the owners.
5
House is secured; no
successful breach.
Security company
and Owners discuss
potential additional
security measures
(e.g. higher fence, a
dog, etc.)
7
Analyst also notifies the owners.
1

More Related Content

What's hot

You're Bleeding. Exposing the Attack Surface in your Supply Chain
You're Bleeding. Exposing the Attack Surface in your Supply ChainYou're Bleeding. Exposing the Attack Surface in your Supply Chain
You're Bleeding. Exposing the Attack Surface in your Supply Chain
SBWebinars
 
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pillThe Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
Frode Hommedal
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
vicenteDiaz_KL
 
Charan Resume
Charan ResumeCharan Resume
Charan Resume
Charan Mukkamala
 
MITRE ATT&CKcon 2018: From Red VS Blue to Red ♥ Blue, Olaf Hartong and Vincen...
MITRE ATT&CKcon 2018: From Red VS Blue to Red ♥ Blue, Olaf Hartong and Vincen...MITRE ATT&CKcon 2018: From Red VS Blue to Red ♥ Blue, Olaf Hartong and Vincen...
MITRE ATT&CKcon 2018: From Red VS Blue to Red ♥ Blue, Olaf Hartong and Vincen...
MITRE - ATT&CKcon
 
Threat Hunting Report
Threat Hunting Report Threat Hunting Report
Threat Hunting Report
Morane Decriem
 
Click and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobileClick and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobile
grugq
 
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
UISGCON
 
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
OWASP Delhi
 
Toward distributed and virtualized enterprise security
Toward distributed and virtualized enterprise securityToward distributed and virtualized enterprise security
Toward distributed and virtualized enterprise security
Priyanka Aash
 
Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9
UISGCON
 
Zafar security cv
Zafar security cvZafar security cv
Zafar security cv
zaffar abbasi
 
Cybersecurity Fundamentals for Legal Professionals
Cybersecurity Fundamentals for Legal ProfessionalsCybersecurity Fundamentals for Legal Professionals
Cybersecurity Fundamentals for Legal Professionals
Shawn Tuma
 
(SACON) Shomiron das gupta - threat hunting use cases
(SACON) Shomiron das gupta - threat hunting use cases(SACON) Shomiron das gupta - threat hunting use cases
(SACON) Shomiron das gupta - threat hunting use cases
Priyanka Aash
 
lec security
lec securitylec security
lec security
Engr. ZEESHAN QAISER
 
Modlishka - Is a Mantis Eating 2FA's Lunch?
Modlishka - Is a Mantis Eating 2FA's Lunch?Modlishka - Is a Mantis Eating 2FA's Lunch?
Modlishka - Is a Mantis Eating 2FA's Lunch?
Lance Peterman
 
How to assign a CVE to yourself?
How to assign a CVE to yourself?How to assign a CVE to yourself?
How to assign a CVE to yourself?
Ramin Farajpour Cami
 
Crowd-Sourced Threat Intelligence
Crowd-Sourced Threat IntelligenceCrowd-Sourced Threat Intelligence
Crowd-Sourced Threat Intelligence
AlienVault
 
Machine learning how not to lose the user
Machine learning how not to lose the userMachine learning how not to lose the user
Machine learning how not to lose the user
Nuritps
 

What's hot (19)

You're Bleeding. Exposing the Attack Surface in your Supply Chain
You're Bleeding. Exposing the Attack Surface in your Supply ChainYou're Bleeding. Exposing the Attack Surface in your Supply Chain
You're Bleeding. Exposing the Attack Surface in your Supply Chain
 
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pillThe Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
Charan Resume
Charan ResumeCharan Resume
Charan Resume
 
MITRE ATT&CKcon 2018: From Red VS Blue to Red ♥ Blue, Olaf Hartong and Vincen...
MITRE ATT&CKcon 2018: From Red VS Blue to Red ♥ Blue, Olaf Hartong and Vincen...MITRE ATT&CKcon 2018: From Red VS Blue to Red ♥ Blue, Olaf Hartong and Vincen...
MITRE ATT&CKcon 2018: From Red VS Blue to Red ♥ Blue, Olaf Hartong and Vincen...
 
Threat Hunting Report
Threat Hunting Report Threat Hunting Report
Threat Hunting Report
 
Click and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobileClick and Dragger: Denial and Deception on Android mobile
Click and Dragger: Denial and Deception on Android mobile
 
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
Adrian Aldea - IBM X-Force 2013 Mid-Year Trend and Risk Report #uisgcon9
 
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resourcesGetting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
 
Toward distributed and virtualized enterprise security
Toward distributed and virtualized enterprise securityToward distributed and virtualized enterprise security
Toward distributed and virtualized enterprise security
 
Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9
 
Zafar security cv
Zafar security cvZafar security cv
Zafar security cv
 
Cybersecurity Fundamentals for Legal Professionals
Cybersecurity Fundamentals for Legal ProfessionalsCybersecurity Fundamentals for Legal Professionals
Cybersecurity Fundamentals for Legal Professionals
 
(SACON) Shomiron das gupta - threat hunting use cases
(SACON) Shomiron das gupta - threat hunting use cases(SACON) Shomiron das gupta - threat hunting use cases
(SACON) Shomiron das gupta - threat hunting use cases
 
lec security
lec securitylec security
lec security
 
Modlishka - Is a Mantis Eating 2FA's Lunch?
Modlishka - Is a Mantis Eating 2FA's Lunch?Modlishka - Is a Mantis Eating 2FA's Lunch?
Modlishka - Is a Mantis Eating 2FA's Lunch?
 
How to assign a CVE to yourself?
How to assign a CVE to yourself?How to assign a CVE to yourself?
How to assign a CVE to yourself?
 
Crowd-Sourced Threat Intelligence
Crowd-Sourced Threat IntelligenceCrowd-Sourced Threat Intelligence
Crowd-Sourced Threat Intelligence
 
Machine learning how not to lose the user
Machine learning how not to lose the userMachine learning how not to lose the user
Machine learning how not to lose the user
 

Similar to Infographic analytics infographic_illustrations_120617

29386971 hacking
29386971 hacking29386971 hacking
29386971 hacking
joeymar143
 
Infosec cert service
Infosec cert serviceInfosec cert service
Infosec cert service
Minh Le
 
Network security monitoring with open source tools
Network security monitoring with open source toolsNetwork security monitoring with open source tools
Network security monitoring with open source tools
terriert
 
The Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOSThe Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOS
Priyanka Aash
 
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
BeyondTrust
 
External Attacks Against Pivileged Accounts
External Attacks Against Pivileged AccountsExternal Attacks Against Pivileged Accounts
External Attacks Against Pivileged Accounts
Lindsay Marsh
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
21CT Inc.
 
Corporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance ThreatsCorporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance Threats
pattcom
 
IRP on a Budget
IRP on a BudgetIRP on a Budget
IRP on a Budget
Sean D. Goodwin
 
APT in the Financial Sector
APT in the Financial SectorAPT in the Financial Sector
APT in the Financial Sector
LIFARS
 
Ethical Hacking by Krutarth Vasavada
Ethical Hacking by Krutarth VasavadaEthical Hacking by Krutarth Vasavada
Ethical Hacking by Krutarth Vasavada
Krutarth Vasavada
 
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
infosec train
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdf
ShivamSharma909
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
TechBiz Forense Digital
 
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
Varun Mithran
 
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
OWASP EEE
 
Insider threat-what-us-do d-want
Insider threat-what-us-do d-wantInsider threat-what-us-do d-want
Insider threat-what-us-do d-want
Security Bootcamp
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Rishi Singh
 
CYBER51-FYLER
CYBER51-FYLERCYBER51-FYLER
CYBER51-FYLER
Cyber 51 LLC
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
Ivanti
 

Similar to Infographic analytics infographic_illustrations_120617 (20)

29386971 hacking
29386971 hacking29386971 hacking
29386971 hacking
 
Infosec cert service
Infosec cert serviceInfosec cert service
Infosec cert service
 
Network security monitoring with open source tools
Network security monitoring with open source toolsNetwork security monitoring with open source tools
Network security monitoring with open source tools
 
The Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOSThe Incident Response Playbook for Android and iOS
The Incident Response Playbook for Android and iOS
 
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
External Attacks Against Privileged Accounts - How Federal Agencies Can Build...
 
External Attacks Against Pivileged Accounts
External Attacks Against Pivileged AccountsExternal Attacks Against Pivileged Accounts
External Attacks Against Pivileged Accounts
 
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of CompromiseInsight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
 
Corporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance ThreatsCorporate Espionage: Technical Surveillance Threats
Corporate Espionage: Technical Surveillance Threats
 
IRP on a Budget
IRP on a BudgetIRP on a Budget
IRP on a Budget
 
APT in the Financial Sector
APT in the Financial SectorAPT in the Financial Sector
APT in the Financial Sector
 
Ethical Hacking by Krutarth Vasavada
Ethical Hacking by Krutarth VasavadaEthical Hacking by Krutarth Vasavada
Ethical Hacking by Krutarth Vasavada
 
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdf
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
SOC Analyst Guide For Beginners SOC analysts work as members of a managed sec...
 
[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence[Bucharest] Attack is easy, let's talk defence
[Bucharest] Attack is easy, let's talk defence
 
Insider threat-what-us-do d-want
Insider threat-what-us-do d-wantInsider threat-what-us-do d-want
Insider threat-what-us-do d-want
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
CYBER51-FYLER
CYBER51-FYLERCYBER51-FYLER
CYBER51-FYLER
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 

More from Richard Smiraldi

Mobile_Tablet_Desktop_Vector_Carousel_Images_with_lorem_fpo.pdf
Mobile_Tablet_Desktop_Vector_Carousel_Images_with_lorem_fpo.pdfMobile_Tablet_Desktop_Vector_Carousel_Images_with_lorem_fpo.pdf
Mobile_Tablet_Desktop_Vector_Carousel_Images_with_lorem_fpo.pdf
Richard Smiraldi
 
rsmiraldi_WHITEPAPER_SAMPLE.pdf
rsmiraldi_WHITEPAPER_SAMPLE.pdfrsmiraldi_WHITEPAPER_SAMPLE.pdf
rsmiraldi_WHITEPAPER_SAMPLE.pdf
Richard Smiraldi
 
rsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdf
rsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdfrsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdf
rsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdf
Richard Smiraldi
 
rsmiraldi_SAMPLE_SOLUTIONS_BRIEF.pdf
rsmiraldi_SAMPLE_SOLUTIONS_BRIEF.pdfrsmiraldi_SAMPLE_SOLUTIONS_BRIEF.pdf
rsmiraldi_SAMPLE_SOLUTIONS_BRIEF.pdf
Richard Smiraldi
 
Cyber threats sample
Cyber threats sampleCyber threats sample
Cyber threats sample
Richard Smiraldi
 
Analyst sample Presentation
Analyst sample PresentationAnalyst sample Presentation
Analyst sample Presentation
Richard Smiraldi
 
Vz scrubbed sample_2
Vz scrubbed sample_2Vz scrubbed sample_2
Vz scrubbed sample_2
Richard Smiraldi
 
Cyber Threats Presentation Sample
Cyber Threats Presentation SampleCyber Threats Presentation Sample
Cyber Threats Presentation Sample
Richard Smiraldi
 
Sample verizon infographic_audio_conf
Sample verizon infographic_audio_confSample verizon infographic_audio_conf
Sample verizon infographic_audio_conf
Richard Smiraldi
 
Infographic vo ip_ip_trucking_collateral_fatima_082117
Infographic vo ip_ip_trucking_collateral_fatima_082117Infographic vo ip_ip_trucking_collateral_fatima_082117
Infographic vo ip_ip_trucking_collateral_fatima_082117
Richard Smiraldi
 
Cx longitude infographic_v3-081419
Cx longitude infographic_v3-081419Cx longitude infographic_v3-081419
Cx longitude infographic_v3-081419
Richard Smiraldi
 
Audio conf infographic v.5
Audio conf infographic v.5Audio conf infographic v.5
Audio conf infographic v.5
Richard Smiraldi
 
network_call_redirect_ncr_short_overview_apacemeaus_rs
network_call_redirect_ncr_short_overview_apacemeaus_rsnetwork_call_redirect_ncr_short_overview_apacemeaus_rs
network_call_redirect_ncr_short_overview_apacemeaus_rs
Richard Smiraldi
 
outbound_tdm_voice_short_overview_us_rs
outbound_tdm_voice_short_overview_us_rsoutbound_tdm_voice_short_overview_us_rs
outbound_tdm_voice_short_overview_us_rs
Richard Smiraldi
 
011918 incident analytics_service_fact_sheet_rs
011918 incident analytics_service_fact_sheet_rs011918 incident analytics_service_fact_sheet_rs
011918 incident analytics_service_fact_sheet_rs
Richard Smiraldi
 
011918 executive breach_simulation_customer_fac_rs
011918 executive breach_simulation_customer_fac_rs011918 executive breach_simulation_customer_fac_rs
011918 executive breach_simulation_customer_fac_rs
Richard Smiraldi
 
011918 espionage health_check_fact_sheet_rs
011918 espionage health_check_fact_sheet_rs011918 espionage health_check_fact_sheet_rs
011918 espionage health_check_fact_sheet_rs
Richard Smiraldi
 
Ecommerce landing-page-examples
Ecommerce landing-page-examplesEcommerce landing-page-examples
Ecommerce landing-page-examples
Richard Smiraldi
 
Verizon landing page
Verizon landing pageVerizon landing page
Verizon landing page
Richard Smiraldi
 
Sample 091218 virtual_communications_express_customer
Sample 091218 virtual_communications_express_customerSample 091218 virtual_communications_express_customer
Sample 091218 virtual_communications_express_customer
Richard Smiraldi
 

More from Richard Smiraldi (20)

Mobile_Tablet_Desktop_Vector_Carousel_Images_with_lorem_fpo.pdf
Mobile_Tablet_Desktop_Vector_Carousel_Images_with_lorem_fpo.pdfMobile_Tablet_Desktop_Vector_Carousel_Images_with_lorem_fpo.pdf
Mobile_Tablet_Desktop_Vector_Carousel_Images_with_lorem_fpo.pdf
 
rsmiraldi_WHITEPAPER_SAMPLE.pdf
rsmiraldi_WHITEPAPER_SAMPLE.pdfrsmiraldi_WHITEPAPER_SAMPLE.pdf
rsmiraldi_WHITEPAPER_SAMPLE.pdf
 
rsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdf
rsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdfrsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdf
rsmiraldi_SAMPLE_FocusSecWhereitMatters_PPT_022819_DRAFT_V2.pdf
 
rsmiraldi_SAMPLE_SOLUTIONS_BRIEF.pdf
rsmiraldi_SAMPLE_SOLUTIONS_BRIEF.pdfrsmiraldi_SAMPLE_SOLUTIONS_BRIEF.pdf
rsmiraldi_SAMPLE_SOLUTIONS_BRIEF.pdf
 
Cyber threats sample
Cyber threats sampleCyber threats sample
Cyber threats sample
 
Analyst sample Presentation
Analyst sample PresentationAnalyst sample Presentation
Analyst sample Presentation
 
Vz scrubbed sample_2
Vz scrubbed sample_2Vz scrubbed sample_2
Vz scrubbed sample_2
 
Cyber Threats Presentation Sample
Cyber Threats Presentation SampleCyber Threats Presentation Sample
Cyber Threats Presentation Sample
 
Sample verizon infographic_audio_conf
Sample verizon infographic_audio_confSample verizon infographic_audio_conf
Sample verizon infographic_audio_conf
 
Infographic vo ip_ip_trucking_collateral_fatima_082117
Infographic vo ip_ip_trucking_collateral_fatima_082117Infographic vo ip_ip_trucking_collateral_fatima_082117
Infographic vo ip_ip_trucking_collateral_fatima_082117
 
Cx longitude infographic_v3-081419
Cx longitude infographic_v3-081419Cx longitude infographic_v3-081419
Cx longitude infographic_v3-081419
 
Audio conf infographic v.5
Audio conf infographic v.5Audio conf infographic v.5
Audio conf infographic v.5
 
network_call_redirect_ncr_short_overview_apacemeaus_rs
network_call_redirect_ncr_short_overview_apacemeaus_rsnetwork_call_redirect_ncr_short_overview_apacemeaus_rs
network_call_redirect_ncr_short_overview_apacemeaus_rs
 
outbound_tdm_voice_short_overview_us_rs
outbound_tdm_voice_short_overview_us_rsoutbound_tdm_voice_short_overview_us_rs
outbound_tdm_voice_short_overview_us_rs
 
011918 incident analytics_service_fact_sheet_rs
011918 incident analytics_service_fact_sheet_rs011918 incident analytics_service_fact_sheet_rs
011918 incident analytics_service_fact_sheet_rs
 
011918 executive breach_simulation_customer_fac_rs
011918 executive breach_simulation_customer_fac_rs011918 executive breach_simulation_customer_fac_rs
011918 executive breach_simulation_customer_fac_rs
 
011918 espionage health_check_fact_sheet_rs
011918 espionage health_check_fact_sheet_rs011918 espionage health_check_fact_sheet_rs
011918 espionage health_check_fact_sheet_rs
 
Ecommerce landing-page-examples
Ecommerce landing-page-examplesEcommerce landing-page-examples
Ecommerce landing-page-examples
 
Verizon landing page
Verizon landing pageVerizon landing page
Verizon landing page
 
Sample 091218 virtual_communications_express_customer
Sample 091218 virtual_communications_express_customerSample 091218 virtual_communications_express_customer
Sample 091218 virtual_communications_express_customer
 

Recently uploaded

How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
Aleksey Savkin
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
Aggregage
 
Call8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessingCall8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessing
➑➌➋➑➒➎➑➑➊➍
 
Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)
Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)
Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)
Lviv Startup Club
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
ecamare2
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 
Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Best Competitive Marble Pricing in Dubai - ☎ 9928909666Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Stone Art Hub
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Kalyan Satta Matka Guessing Matka Result Main Bazar chart
 
Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
Alexandra Fulford
 
GKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt PresentationGKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt Presentation
GraceKohler1
 
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
Lacey Max
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
taqyea
 
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Operational Excellence Consulting
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
Kirill Klimov
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
Operational Excellence Consulting
 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
sssourabhsharma
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
Top Forex Brokers Review
 

Recently uploaded (20)

How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
How to Implement a Strategy: Transform Your Strategy with BSC Designer's Comp...
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
 
Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
 
Call8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessingCall8328958814 satta matka Kalyan result satta guessing
Call8328958814 satta matka Kalyan result satta guessing
 
Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)
Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)
Maksym Vyshnivetskyi: PMO KPIs (UA) (#12)
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 
Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Best Competitive Marble Pricing in Dubai - ☎ 9928909666Best Competitive Marble Pricing in Dubai - ☎ 9928909666
Best Competitive Marble Pricing in Dubai - ☎ 9928909666
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
 
Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
 
GKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt PresentationGKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt Presentation
 
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
How are Lilac French Bulldogs Beauty Charming the World and Capturing Hearts....
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
 
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
 
Digital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on SustainabilityDigital Marketing with a Focus on Sustainability
Digital Marketing with a Focus on Sustainability
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
 

Infographic analytics infographic_illustrations_120617

  • 1. Cyber Defense Continuum. Main Characters. Supporting Characters. Schoolboy Owners Gardener Forensic team Mailman Analyst Thief SWAT Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur. System auto-recognizes trusted insider. Plot: Schoolboy comes home. Fence camera picks up via biometrics, e.g. face recognition. Result: System auto-recognizes him as a trusted insider. No incident means no response required. Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Sources: 1. International Data Corp (IDC), “U.S. Residential Landline Voice Displacement Forecast, 2016–2020, May 2016. 2. Ovum. Market Landscape: Enterprise Mobility Management 2016. 3. Ovum Trends to Watch: Employee Mobility, Feb 2016; Survey results Enterprise Mobility Ovum 2015/16. 4. Smartphone Connections Forecast 2016 – 21, Aug 2019 Ovum-TMT Intelligence, 2016. 5. Abbreviated disclaimer: Results based on third-party study. 6. Network rankings based on RootMetrics® US National and State RootScore® Reports: 2H 2016. Performance rankings of four mobile networks rely on scores calculated from random samples across all available network types. Your experience may vary. The RootMetrics award is not an endorsement of Verizon. Visit www.rootmetrics.com for more details. 7. Gartner April 11, 2020 “Critical Capabilities for Wireline Telecom Services US”. 2020 North American Frost & Sullivan Award for Market Leadership. J.D. Power ranks Verizon the top wireless network in five regions in the U.S. Achieved highest score from J.D. Power in all three quality categories: calling, messaging and data. For the seventeenth time in a row, Verizon has received more awards than any other provider in the J.D. Power Wireless Network Quality Study. Detection Network Threat Advanced Analytics MSS – Analytics Managed SIEM Advanced SOC Analyst has different options to respond: Data collection & storage and intelligence enrichment Data Intelligence Advanced analytics Initial investigation Incident response Mitigation Emergency response Investigative response Threat analysis / incident detection* USP (Unified Security Portal) Customer tools Security and end-point management Advanced CERT “Threat Intel and Response” Incident response and mitigation Investigative response-ProServ security Response Data Raw data enriched Adv. analytics Analyst Incident triage Incident creation End-point Secure house Notify owners MSS-prem (MSS – Premises) Call CSIRT Call CERT Services Incident workflow SIEM / SOC NTAA (Network Threat Advanced Analytics) Anomaly-based monitoring & analytics of NetFlow traffic on Verizon platform into USP; SOC support. Verizon Platform. USP (SOC support) MSSA (MSS Analytics) Standard monitoring analytics on Verizon platform into Verizon SOC / USP. Verizon Platform. Verizon SOC / USP MSIEM (Managed SIEM) Monitoring analytics on customer SIEM into Verizon SOC / USP. Customer SIEM Verizon SOC / USP ASOC (Advanced SOC) Tailored monitoring analytics from customer SIEM into customer dedicated Verizon ASOC / IM mgmt platform. Customer SIEM Cust. dedicated Verizon ASOC / IM Summary. Cyber Defense Continuum. Contractor. Trusted actor gone wrong. Schoolboy. Trusted actor. Street camera picks up school bus.1 Fence camera picks up schoolboy via face recognition. 2 System recognizes schoolboy as trusted insider and does not create an incident. 3 No incident means no response required. 3 2 4 1 ResponseDetection Analyst recognizes trusted 3rd party. Plot: Mailman drops off a parcel at the mailbox behind the fence. Analyst recognizes trusted 3rd party. Result: An incident is identified but initial triage shows there is no threat. Owners are just notified. Mailman. Accept risk. Detection Mailman Boy Analyst Owner Response 1 Street camera picks up postal truck. Fence camera picks up image of mailman on the way in - and on the way out again. 2 3 Camera inside the house does not show any activity. 4 The system aggregates all information. 5 Analyst evaluates all information, determines that it is a trusted 3rd party, and creates an incident (but no threat) that only requires notification. 2 3 4 6 1 Thief. Immediate threat. Untrusted 3rd party triggers incident - SWAT stops thief before damage. Plot: Person looking like a thief gets over the fence using a ladder. Result: Analyst recognizes the immediate threat and calls in the SWAT team. The SWAT team manages to arrest the thief before he can get into the house. Trusted 3rd party goes rogue. Plot: A Gardener was hired to do a landscaping job around the house (and behind the fence). He abuses/exceeds his privileges by breaking into the actual house where he is looking for jewelry. Result: Inside camera picks up the Gardener and analyst remotely looks the door to the bedroom (with safe inside). At the same time, he alerts the SWAT team that manages to arrest the Gardener inside the house / before he can get away. A breach has happened but nothing was stolen and the Owners and Security company do a forensic investigation as to how to improve security posture. Detection Detection Thief Contractor Owner Owner Response Response Street camera picks up suspiciously looking untrusted 3rd party.1 Street camera and fence camera see Gardener getting onto the premises.1 Fence camera picks up image of thief getting over the fence.2 2 Gardener breaks into the house and inside camera monitors this activity. System aggregates all information.3 3 Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip. Analyst escalates and calls in the SWAT team. 4 6 SWAT team manages to arrest the thief before he can get into the house. 2 3 2 3 4 4 5 1 1 Analyst Analyst System (triggered by Analyst) only notifies the owners. 5 House is secured; no successful breach. Security company and Owners discuss potential additional security measures (e.g. higher fence, a dog, etc.) 7 Analyst also notifies the owners. 1