Enterprise Security Monitoring with the Fusion Center Model
Keyword(s):
The Past
◽
In the past few years, we have witnessed cyber-attacks of unprecedented sophistication and reach. These attacks demonstrate that malicious actors have the ability to compromise and control millions of computers that belong to governments, enterprises, and ordinary citizens. If we are to prevent motivated adversaries from attacking our systems, stealing our data, and harming our critical infrastructure, we have to first understand emerging threats to develop proactive security solutions to safeguard the information and the physical infrastructure that rely on it. This chapter discusses one possible approach to defending against malicious actors at the enterprise level.