Information assurance: a cyber security storm map

Cyber-security issues affect organisations at all levels. In this article, we will discuss how to apply a visualisation and event correlation tool to facilitate the analysis of data, understanding of data, and dissemination of information to all affected parties. The visualisation shows an overall view of security events or storms that are occurring on a network while providing information in reference to severity and a propagation pattern. The tool can potentially provide an early warning so that events or storms can be proactively mitigated. Thus, organisations can make business decisions by determining or understanding the relationship between the computing devices and the business/information technology services they make-up.

[1]  Chase Qishi Wu,et al.  Monitoring security events using integrated correlation-based techniques , 2009, CSIIRW '09.

[2]  John C. McCarthy,et al.  Technology as experience , 2004, INTR.

[3]  Dipankar Dasgupta,et al.  Consequences of Diminishing Trust in Cyberspace , 2013, Int. J. Cyber Warf. Terror..

[4]  Chase Qishi Wu,et al.  A Cyber-Security Storm MAP , 2012, 2012 International Conference on Cyber Security.

[5]  Brenda Dervin,et al.  Sense-making theory and practice: an overview of user interests in knowledge seeking and use , 1998, J. Knowl. Manag..

[6]  Chase Qishi Wu,et al.  An integrated cyber security monitoring system using correlation-based techniques , 2009, 2009 IEEE International Conference on System of Systems Engineering (SoSE).

[7]  Gilbert Cockton Revisiting usability's three key principles , 2008, CHI Extended Abstracts.

[8]  Chase Qishi Wu,et al.  Visualization of security events using an efficient correlation technique , 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security.

[9]  Colin Ware,et al.  Information Visualization: Perception for Design , 2000 .

[10]  Christine E. Wania,et al.  How do design and evaluation interrelate in HCI research? , 2006, DIS '06.