Since we can’t make image posts, here’s a link to a [finished version]( of this diagram (you’ll need to zoom in to see it clearly). Here’s a [download link]( (onedrive) for the source file so anyone can derive from / edit it for their needs. Feel free to share / use it without attribution.

I posted an [earlier draft of this]( over on r/lowlevel for peer review and they seemed to believe it to be accurate. So, for any of you out there looking to better understand the problem-set of endpoint threat recognition on a fundamental level, you might find this helpful. It’s an attempt at taking a very nebulous topic and break it down into a series of more digestible concepts.

Share This Discussion

Leave a Comment

Note: By filling this form and submitting your commen, you acknowledge, agree and comply with our terms of service. In addition you acknowledge that you are willingly sharing your email address with AiOWikis and you might receive notification emails from AiOWikis for comment notifications. AiOWiksi guarantees that your email address WILL NOT be used for advertisement or email marketting purposes.

This site uses Akismet to reduce spam. Learn how your comment data is processed.