Figure 3

Figure 3: View of a SIEM dashboard with the sources and targets of security incidents.