Essays about: "Cybersecurity visualization"

Found 4 essays containing the words Cybersecurity visualization.

  1. 1. Visualization Of Cyber Threats : Visualization To Leading Operatives During Cybersecurity exercises

    University essay from Uppsala universitet/Institutionen för samhällsbyggnad och industriell teknik

    Author : Gustaf Tysk; [2023]
    Keywords : Situational Awareness; Common operational picture; Perception; Comprehension; Projection; Cybersecurity; Defense; Visualization;

    Abstract : The increasing dependence on digital infrastructure leaves individuals, societies and even nations vulnerable in the case of a cyberattack. To prepare for threats and attacks, cyberattacks be simulated in environments called cyber ranges. CYBER RANGE AND TRAINING ENVIRONMENT (CRATE), Sweden's cyber range, is an example of such an environment. READ MORE

  2. 2. The Challenges in Leveraging Cyber Threat Intelligence

    University essay from Högskolan i Halmstad

    Author : Shikha Gupta; Shijo Joseph; Deepu Sasidharan; [2021]
    Keywords : Threat Intelligence; Cyber Threat Intelligence;

    Abstract : Today cyber attacks, incidents, threats, and breaches continue to rise in scale and numbers, as sophisticated attackers continuously break through conventional safeguards each day. Whether strategic, operational, or tactical, threat intelligence can be defined as aggregated information and analytics that feed the different pillars of any given company’s cybersecurity infrastructure. READ MORE

  3. 3. Identifying Challenges in Cybersecurity Data Visualization Dashboards

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Patrick Shirazi; [2020]
    Keywords : Cybersecurity visualization; Security visualization; security dashboards; Delphi technique;

    Abstract : Nowadays, a massive amount of cybersecurity data-objects, such as security events, logs,messages, are flowing through different cybersecurity systems. With the enormous fastdevelopment of different cloud environments, big data, IoT, and so on, these amounts of data areincreasingly revolutionary. READ MORE

  4. 4. Visualization and Natural Language Representation of Simulated Cyber Attacks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xinyue Mao; [2018]
    Keywords : attack path visualization; taxonomy for attack graph; natural language representation; attackvägsvisualisering; taxonomi för attackgraf; naturlig språkrepresentation;

    Abstract : The attack path is an effective tool for showing possible hacking routestaken by an attacker to target a specific computer network. It also informsadministrators about potential weakness in a network helpingthem roll-out network configuration changes. Based on predefinedcomputing methods, a large number of attack paths can be generated. READ MORE