Security visualisation
|
|
|
- Arline Barker
- 10 years ago
- Views:
Transcription
1 Security visualisation This thesis provides a guideline of how to generate a visual representation of a given dataset and use visualisation in the evaluation of known security vulnerabilities by Marco Krebs and William Rothwell Royal Holloway series Information Security Vulnerability Management Information Visualisation istockphto/thinkstock
2 Visualisation in vulnerability management Information visualisation is a great tool to support the vulnerability management process. If done properly, data can be visualised in a way that the critical issues stand out immediately and can be prioritised accordingly by Marco Krebs and William Rothwell A picture is worth a thousand log records. Here is a guideline of how to generate a visual representation of a given dataset and use visualisation in the evaluation of known security vulnerabilities. Although this example is based on the output of an automated vulnerability scanner (Nessus), the suggested information visualisation process can be applied to generate any kind of visualisation. Have you ever been stuck looking at a list of security vulnerabilities that seems endless? You are not alone... Even worse: All issues appear to be of high priority and of equal importance at first sight. However, given the limited amount of time and resources in practice, it is key that each of them is carefully evaluated and prioritised to take adequate steps towards mitigation. If not done properly, the lack of prioritisation many times leads to the fact that known vulnerabilities do not get fixed within an appropriate time frame if they get fixed at all. This is a perfect example where information visualisation can help with the process of prioritisation. What if you had a visual representation of the findings that not only shows the underlying network architecture but makes the most critical issues sticking out immediately? What if you could see from this visual the attack path and identify potential security enforcement points along that path to cut-off the attacker? If done properly, information visualisation takes advantages of human perception. As human beings we are literally wired to see: The human visual system is often described as a flexible pattern finder that can quickly detect changes in size, color, shape, movement or texture. Basic graph design principles Therefore, by following certain (simple) rules, a given visualisation can be more expressive and effective than another. Some of these principles to graphical excellence are as follows: Reduce non-data ink (show nothing else but the data) Show no more than five distinct attributes (rule of thumb) Follow Gestalt principles (use the human pattern detection engine) Emphasise exceptions (making them jump out immediately) Show comparisons (identification of differences) Annotate data (use labels and legends to guide the reader) Show causality (always explain the root cause of outliers) So, how does this work? Let s look at a practical example where we take the output from the Nessus vulnerability scanner and turn that (raw) data into something meaningful (also known as information). Nessus is a widely used vulnerability-scanning tool. Its goal is to detect potential vulnerabilities on the tested system(s). The software is free of charge for personal use. The goal of information visualisation is to transform abstract data into computer graphics that are easy to understand and to use to support decision making and reasoning Greg Conti -2-
3 This leads us to the information visualisation process. The information visualisation process The generation of any visual representation is an iterative process. Starting from a given dataset and feeding it to a visualisation engine the outcome is a graphical representation, which communicates a message to the reader. 1) Problem definition and message: First, the problem or objective must be clear to start with. What is it that you want to visualise? Implementation details do not matter yet. Is the purpose of the visual representation to communicate something that is already evident but hidden in the underlying data, or is the goal to identify trends and relationships? This is defined best in a goal statement, for example: Starting from the results of a Nessus vulnerability scan, my goal is to generate a visual representation that goes beyond the form of the usual list/table of weaknesses. The graph should reflect the underlying network infrastructure and allow the quick identification of critical issues. It should support the reader in the (risk-based) prioritisation of further actions. Graphical excellence is that which gives to the viewer the greatest number of ideas in the shortest time with the least ink in the smallest space Edward Tufte 2) Data analysis: Second, we need to find out what type of data is required and what the data structures look like. Based on the goal statement above we need data on network topology, the vulnerabilities identified per system but also some rating/scoring system to determine the severity level. Reports from the Nessus scanner can be saved in various formats. One example is the NBE format, which is a pipe-delimited text file that can be easily imported into external programs. Besides general information about the scan it contains the scan results as well as routing information from the scan host to the destination machine(s). This means that the network architecture can be drawn based on these routes recorded. The level of detail of the findings listed in the NBE file varies from an open port found message to a more detailed explanation containing a risk indicator Figure 1: The information visualisation process -3-
4 such as the CVSS base score. CVSS stands for Common Vulnerability Scoring System. Over the years it has emerged into a de-facto standard on how to evaluate security vulnerabilities. The base score is build from the evaluation of different metrics and ranges from 0 (lowest, least severe) to 10 (highest, most severe). This score is a good indicator of prioritisation: Obviously, the issue(s) with the highest score should be addressed first. 3) Process information: The data provided in the NBE file need to be preprocessed (parsed) into logical structures that can be understood by the visualisation tool used to generate the graphical representation. One tool requires a simple comma-separated text file whereas another one requires input in a more proprietary format. For this example, I used GraphViz, a widely used open-source graph visualisation software. GraphViz properties are defined in the so-called DOT language. Hence a parser is required to extract the relevant data and to perform a translation and/or normalisation between the Nessus data and the attributes of the DOT language. Figure 2 below shows a graphical representation of the network architecture based on the routing information in the Nessus file. It is apparent that all systems can be reached from the scanning host (in red) via the device with IP address (in rectangular shape). What is still missing is the information about the identified vulnerabilities. This will be added next. The trick lies in creating the visualisation system that best fits your needs Greg Conti 4) Visual transformation: The fourth and next step is about mapping the scan information to graphical elements and assigning visual properties. In order to make critical issues visible ( pop out ) immediately to the human eye, some scoring system needs to be applied that allows building a relationship between key visual attributes and the number of vulnerabilities and their severity. Color can be used to mark a node according to the rating of the most severe vulnerability found on that host. For this example, I used a scale that can be determined from the CVSS base score as follows: Another attribute can be the size of a node, which varies depending on the total number of vulnerabilities found on that host. The bigger a node, the greater the number of vulnerabilities assigned to that host. 5) View transformation: Now, at the fifth stage of the information visualisation process, we are ready to generate the graphical representation. This is often an iterative process by itself because this is a question of design, too. Does the graph look as expected? Are all objects visible? Is a modification of graph elements/attributes required? If yes, we need to go back to the previous stage, select a different set of attributes and run the data visualisation engine again I consider this the hardest part of the process. Figure 2: Graphical representation of network topology (node-link graph) -4-
5 Table 1: Colour-coding scheme Colour Rating CVSS base score Red Critical Greater than 8 Orange Important Between 6 and 8 Yellow Moderate between 4 and 6 Light blue Low between 2 and 4 Grey Info less than 2 Another option to think of is data aggregation so that less important information can be shown in condensed form. One of the key principles of how to bring data into visualisations is known as the information seeking mantra by Ben Shneiderman. Overview first: Gain an overview of the entire data collection first. The first visualisation often serves as a general indicator and can be used to further tune the graph attributes in the right direction. Zoom and filter: Once an area of interest has been identified, another graph can be created that zooms in on them. Items that are not of interest can be filtered out (aggregation). This requires changing the graph attributes once more. Details on demand: Depending on the necessary level of detail required, this process is repeated to show a few selected items only. 6) Interpret and decide: When satisfied with the outcome, the aesthetics of the visual design and the question on the result can be considered. Does the graph communicate the message as expected (refer to the goal statement set in step one)? And, of equal importance, is the reader able to understand it? If you can answer both questions with a yes, then congratulations! The journey has come to an end at least for now. As data tell a story, you may likely discover new elements that lead to further analysis. Information visualisation is all about detecting patterns, spotting outliers, and getting useful actionable insight from billions of pieces of data stockbyte/thinkstock -5-
6 From this... (Nessus output file)...to this Figure 3: Graphical representation of Nessus output The outcome of this process is as follows: Figure 3 was generated following the six-step visualisation process described above. Nodes marked in red contain the most critical vulnerabilities (refer to table 1 above). The size of each node further gives an indication of the total number of issues found on that host. The numbers in brackets represent the amount of vulnerabilities per severity level (critical/important/moderate/low/info). Network topology information is provided as well. You can easily see that most promising system to attack is (on the left) for its high number of (critical) vulnerabilities. At its core, information visualisation is all about detecting patterns, spotting outliers, and getting useful actionable insight from billions of pieces of data. By emerging into the field of visual analytics, people will be able to interactively interact, discover, and manipulate data to reveal and communicate the story that is important to them. I hope that you will become part of that community, too. Seeing is believing let the data tell the story. n About the authors Marco Krebs interest in information security was caught when given the opportunity to engineer a Linux-based Internet gateway in Since then, Marco has been working in different areas of information security, including security/network/systems engineering, consulting, and security testing. His current position includes building-up and running the computer emergency response team for a Swiss financial institute. Subjects of interest are information visualisation, R&D, security monitoring, and forensics. William Rothwell is an experienced security practitioner with over 20 years in the information security field for government, military, finance and commercial organisations. He specializes in security architecture and design, crypto application and system intrusion defense research. In 2004 he founded Abatis Limited, which provides a unique, patent protected, non-signature based solution to protect computers from malware infection and hacking intrusions. Overview first, zoom and filter, then details on demand The information-seeking mantra by Ben Shneiderman -6-
What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options
White paper What a Vulnerability Assessment Scanner Can t Tell You Leveraging Network Context to Prioritize Remediation Efforts and Identify Options november 2011 WHITE PAPER RedSeal Networks, Inc. 3965
When Recognition Matters THE COMPARISON OF PROGRAMS FOR NETWORK MONITORING. www.pecb.com
When Recognition Matters THE COMPARISON OF PROGRAMS FOR NETWORK MONITORING www.pecb.com Imagine a working environment comprised of a number of switches, routers, some terminals and file servers. Network
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
ECS 235A Project - NVD Visualization Using TreeMaps
ECS 235A Project - NVD Visualization Using TreeMaps Kevin Griffin Email: [email protected] December 12, 2013 1 Introduction The National Vulnerability Database (NVD) is a continuously updated United
Vulnerability Assessment Report Format Data Model
I3E'2005 Vulnerability Assessment Report Format Data Model Dr.D.Polemi G.Valvis Issues Attack paradigm Vulnerability exploit life cycle Vulnerability assessment process Challenges in vulnerability assessment
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
Data Visualisation and Its Application in Official Statistics. Olivia Or Census and Statistics Department, Hong Kong, China [email protected].
Data Visualisation and Its Application in Official Statistics Olivia Or Census and Statistics Department, Hong Kong, China [email protected] Abstract Data visualisation has been a growing topic of
Effective Visualization Techniques for Data Discovery and Analysis
WHITE PAPER Effective Visualization Techniques for Data Discovery and Analysis Chuck Pirrello, SAS Institute, Cary, NC Table of Contents Abstract... 1 Introduction... 1 Visual Analytics... 1 Static Graphs...
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project Advisor: Sharon Goldberg Adam Udi 1 Introduction Interdomain routing, the primary method of communication on the internet,
NVisionIP: An Interactive Network Flow Visualization Tool for Security
NVisionIP: An Interactive Network Flow Visualization Tool for Security Kiran Lakkaraju William Yurcik Ratna Bearavolu Adam J. Lee National Center for Supercomputing Applications (NCSA) University of Illinois,
DM810 Computer Game Programming II: AI. Lecture 11. Decision Making. Marco Chiarandini
DM810 Computer Game Programming II: AI Lecture 11 Marco Chiarandini Department of Mathematics & Computer Science University of Southern Denmark Resume Decision trees State Machines Behavior trees Fuzzy
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats
Network-Based Tools for the Visualization and Analysis of Domain Models
Network-Based Tools for the Visualization and Analysis of Domain Models Paper presented as the annual meeting of the American Educational Research Association, Philadelphia, PA Hua Wei April 2014 Visualizing
Visualization methods for patent data
Visualization methods for patent data Treparel 2013 Dr. Anton Heijs (CTO & Founder) Delft, The Netherlands Introduction Treparel can provide advanced visualizations for patent data. This document describes
Top 5 best practices for creating effective dashboards. and the 7 mistakes you don t want to make
Top 5 best practices for creating effective dashboards and the 7 mistakes you don t want to make p2 Financial services professionals are buried in data that measure and track: relationships and processes,
IBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
an introduction to VISUALIZING DATA by joel laumans
an introduction to VISUALIZING DATA by joel laumans an introduction to VISUALIZING DATA iii AN INTRODUCTION TO VISUALIZING DATA by Joel Laumans Table of Contents 1 Introduction 1 Definition Purpose 2 Data
Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs
Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Principles of Data Visualization
Principles of Data Visualization by James Bernhard Spring 2012 We begin with some basic ideas about data visualization from Edward Tufte (The Visual Display of Quantitative Information (2nd ed.)) He gives
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to
Numbers as pictures: Examples of data visualization from the Business Employment Dynamics program. October 2009
Numbers as pictures: Examples of data visualization from the Business Employment Dynamics program. October 2009 Charles M. Carson 1 1 U.S. Bureau of Labor Statistics, Washington, DC Abstract The Bureau
How To Turn Big Data Into An Insight
mwd a d v i s o r s Turning Big Data into Big Insights Helena Schwenk A special report prepared for Actuate May 2013 This report is the fourth in a series and focuses principally on explaining what s needed
Dynamic Visualization and Time
Dynamic Visualization and Time Markku Reunanen, [email protected] Introduction Edward Tufte (1997, 23) asked five questions on a visualization in his book Visual Explanations: How many? How often? Where? How
Sorting out SIEM strategy Five step guide to full security information visibility and controlled threat management
Sorting out SIEM strategy Five step guide to full security information visibility and controlled threat management This guide will show you how a properly implemented and managed SIEM solution can solve
Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning
Niara Security Analytics Automatically detect attacks on the inside using machine learning Automatically detect attacks on the inside Supercharge analysts capabilities Enhance existing security investments
GRAPHING DATA FOR DECISION-MAKING
GRAPHING DATA FOR DECISION-MAKING Tibor Tóth, Ph.D. Center for Applied Demography and Survey Research (CADSR) University of Delaware Fall, 2006 TABLE OF CONTENTS Introduction... 3 Use High Information
Extreme Networks Security Analytics G2 Risk Manager
DATA SHEET Extreme Networks Security Analytics G2 Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance HIGHLIGHTS Visualize current and potential
What is Penetration Testing?
White Paper What is Penetration Testing? An Introduction for IT Managers What Is Penetration Testing? Penetration testing is the process of identifying security gaps in your IT infrastructure by mimicking
Principles of Data Visualization for Exploratory Data Analysis. Renee M. P. Teate. SYS 6023 Cognitive Systems Engineering April 28, 2015
Principles of Data Visualization for Exploratory Data Analysis Renee M. P. Teate SYS 6023 Cognitive Systems Engineering April 28, 2015 Introduction Exploratory Data Analysis (EDA) is the phase of analysis
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Visualize current and potential network traffic patterns
Attack Graph Techniques
Chapter 2 Attack Graph Techniques 2.1 An example scenario Modern attack-graph techniques can automatically discover all possible ways an attacker can compromise an enterprise network by analyzing configuration
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
ThreatSpike Dome: A New Approach To Security Monitoring
ThreatSpike Dome: A New Approach To Security Monitoring 2015 ThreatSpike Labs Limited The problem with SIEM Hacking, insider and advanced persistent threats can be difficult to detect with existing product
Improving Residual Risk Management Through the Use of Security Metrics
Improving Residual Risk Management Through the Use of Security Metrics Every investment in security should be effective in reducing risk, but how do you measure it? Jonathan Pagett and Siaw-Lynn Ng introduce
The Influence of Software Vulnerabilities on Business Risks 1
The Influence of Software Vulnerabilities on Business Risks 1 Four sources of risk relevant for evaluating the influence of software vulnerabilities on business risks Authors Hilbrand Kramer, MSc (Royal
20 A Visualization Framework For Discovering Prepaid Mobile Subscriber Usage Patterns
20 A Visualization Framework For Discovering Prepaid Mobile Subscriber Usage Patterns John Aogon and Patrick J. Ogao Telecommunications operators in developing countries are faced with a problem of knowing
Visualization Quick Guide
Visualization Quick Guide A best practice guide to help you find the right visualization for your data WHAT IS DOMO? Domo is a new form of business intelligence (BI) unlike anything before an executive
Introduction to Data Visualization
Introduction to Data Visualization STAT 133 Gaston Sanchez Department of Statistics, UC Berkeley gastonsanchez.com github.com/gastonstat/stat133 Course web: gastonsanchez.com/teaching/stat133 Graphics
Visualizing Threats: Improved Cyber Security Through Network Visualization
Visualizing Threats: Improved Cyber Security Through Network Visualization Intended audience This white paper has been written for anyone interested in enhancing an organizational cyber security regime
Cloud-based Log Analysis and Visualization
Cloud-based Log Analysis and Visualization DeepSec 2010, Vienna, Austria mobile-166 My syslog Raffael Marty - @zrlram Raffael (Raffy) Marty Founder @ Chief Security Strategist and Product Manager @ Splunk
SORTING OUT YOUR SIEM STRATEGY:
SORTING OUT YOUR SIEM STRATEGY: FIVE-STEP GUIDE TO TO FULL SECURITY INFORMATION VISIBILITY AND CONTROLLED THREAT MANAGEMENT INTRODUCTION It s your business to know what is happening on your network. Visibility
Visual Scoring the 360 View: 5 Steps for Getting Started with Easier, Faster and More Effective Lead Scoring
Visual Scoring the 360 View: 5 Steps for Getting Started with Easier, Faster and More Effective Lead Scoring Authors: Elissa Fink Wade Tibke Tableau Software p2 Lead Scoring For Most a Great Idea in Concept,
Banking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai [email protected] Abstract New threats are constantly emerging to the security of organization s information
Visualizing Data from Government Census and Surveys: Plans for the Future
Censuses and Surveys of Governments: A Workshop on the Research and Methodology behind the Estimates Visualizing Data from Government Census and Surveys: Plans for the Future Kerstin Edwards March 15,
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
UNIFY YOUR (BIG) DATA
UNIFY YOUR (BIG) DATA ANALYTIC STRATEGY GIVE ANY USER ANY ANALYTIC ON ANY DATA Scott Gnau President, Teradata Labs [email protected] t Unify Your (Big) Data Analytic Strategy Technology excitement:
Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2
Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning
Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA
Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the
Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War
Vulnerability Risk Management 2.0 Best Practices for Managing Risk in the New Digital War In 2015, 17 new security vulnerabilities are identified every day. One nearly every 90 minutes. This consistent
Datascape for Cyber-Security NSA Cyber Defence Exercise Worked Example
Datascape for Cyber-Security NSA Cyber Defence Exercise Worked Example In 2009 the National Security Agency/Central Security Service (NSA/CSS - www.nsa.gov) ran the annual Cyber Defense Exercise (CDX http://www.nsa.gov/public_info/press_room/2009/cyber_defense_trophy.shtml).
TEXT-FILLED STACKED AREA GRAPHS Martin Kraus
Martin Kraus Text can add a significant amount of detail and value to an information visualization. In particular, it can integrate more of the data that a visualization is based on, and it can also integrate
(Refer Slide Time: 2:03)
Control Engineering Prof. Madan Gopal Department of Electrical Engineering Indian Institute of Technology, Delhi Lecture - 11 Models of Industrial Control Devices and Systems (Contd.) Last time we were
INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:
PENETRATION TESTING A SYSTEMATIC APPROACH INTRODUCTION: The basic idea behind writing this article was to put forward a systematic approach that needs to be followed to perform a successful penetration
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding
NNMi120 Network Node Manager i Software 9.x Essentials
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
ALERT LOGIC FOR HIPAA COMPLIANCE
SOLUTION OVERVIEW: ALERT LOGIC FOR HIPAA COMPLIANCE AN OUNCE OF PREVENTION IS WORTH A POUND OF CURE Alert Logic provides organizations with the most advanced and cost-effective means to secure their healthcare
Product Guide. Sawmill Analytics, Swindon SN4 9LZ UK [email protected] tel: +44 845 250 4470
Product Guide What is Sawmill Sawmill is a highly sophisticated and flexible analysis and reporting tool. It can read text log files from over 800 different sources and analyse their content. Once analyzed
Requirements When Considering a Next- Generation Firewall
White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration
Dealing with Big Data in Cyber Intelligence
Dealing with Big Data in Cyber Intelligence Greg Day Security CTO, EMEA, Symantec Session ID: HT-303 Session Classification: General Interest What will I take away from this session? What is driving big
A Review on Zero Day Attack Safety Using Different Scenarios
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios
Choosing Colors for Data Visualization Maureen Stone January 17, 2006
Choosing Colors for Data Visualization Maureen Stone January 17, 2006 The problem of choosing colors for data visualization is expressed by this quote from information visualization guru Edward Tufte:
TestManager Administration Guide
TestManager Administration Guide RedRat Ltd July 2015 For TestManager Version 4.57-1 - Contents 1. Introduction... 3 2. TestManager Setup Overview... 3 3. TestManager Roles... 4 4. Connection to the TestManager
Tableau's data visualization software is provided through the Tableau for Teaching program.
A BEGINNER S GUIDE TO VISUALIZATION Featuring REU Site Collaborative Data Visualization Applications June 10, 2014 Vetria L. Byrd, PhD Advanced Visualization, Director REU Coordinator Visualization Scientist
Threat intelligence visibility the way forward. Mike Adler, Senior Product Manager Assure Threat Intelligence
Threat intelligence visibility the way forward Mike Adler, Senior Product Manager Assure Threat Intelligence The modern challenge Today, organisations worldwide need to protect themselves against a growing
CSU, Fresno - Institutional Research, Assessment and Planning - Dmitri Rogulkin
My presentation is about data visualization. How to use visual graphs and charts in order to explore data, discover meaning and report findings. The goal is to show that visual displays can be very effective
1 Log visualization at CNES (Part II)
1 Log visualization at CNES (Part II) 1.1 Background For almost 2 years now, CNES has set up a team dedicated to "log analysis". Its role is multiple: This team is responsible for analyzing the logs after
Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study
Six Days in the Network Security Trenches at SC14 A Cray Graph Analytics Case Study WP-NetworkSecurity-0315 www.cray.com Table of Contents Introduction... 3 Analytics Mission and Source Data... 3 Analytics
Visualizing Historical Agricultural Data: The Current State of the Art Irwin Anolik (USDA National Agricultural Statistics Service)
Visualizing Historical Agricultural Data: The Current State of the Art Irwin Anolik (USDA National Agricultural Statistics Service) Abstract This paper reports on methods implemented at the National Agricultural
Cloud Infrastructure Security Management
www.netconsulting.co.uk Cloud Infrastructure Security Management Visualise your cloud network, identify security gaps and reduce the risks of cyber attacks. Being able to see, understand and control your
Expert Color Choices for Presenting Data
Expert Color Choices for Presenting Data Maureen Stone, StoneSoup Consulting The problem of choosing colors for data visualization is expressed by this quote from information visualization guru Edward
SHARING THREAT INTELLIGENCE ANALYTICS FOR COLLABORATIVE ATTACK ANALYSIS
SHARING THREAT INTELLIGENCE ANALYTICS FOR COLLABORATIVE ATTACK ANALYSIS Samir Saklikar RSA, The Security Division of EMC Session ID: CLE T05 Session Classification: Intermediate Agenda Advanced Targeted
Design Elements & Principles
Design Elements & Principles I. Introduction Certain web sites seize users sights more easily, while others don t. Why? Sometimes we have to remark our opinion about likes or dislikes of web sites, and
Getting Started with the ArcGIS Predictive Analysis Add-In
Getting Started with the ArcGIS Predictive Analysis Add-In Table of Contents ArcGIS Predictive Analysis Add-In....................................... 3 Getting Started 4..............................................
GEO-VISUALIZATION SUPPORT FOR MULTIDIMENSIONAL CLUSTERING
Geoinformatics 2004 Proc. 12th Int. Conf. on Geoinformatics Geospatial Information Research: Bridging the Pacific and Atlantic University of Gävle, Sweden, 7-9 June 2004 GEO-VISUALIZATION SUPPORT FOR MULTIDIMENSIONAL
Improving Decision Making and Managing Knowledge
Improving Decision Making and Managing Knowledge Decision Making and Information Systems Information Requirements of Key Decision-Making Groups in a Firm Senior managers, middle managers, operational managers,
Dell SonicWALL report portfolio
Dell SonicWALL report portfolio Table of contents Dell SonicWALL Global Management System (GMS ) and Analyzer reports I. Sample on-screen reports II. Sample PDF-generated reports Dell SonicWALL Scrutinizer
Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined
Niara Security Intelligence Threat Discovery and Incident Investigation Reimagined Niara enables Compromised user discovery Malicious insider discovery Threat hunting Incident investigation Overview In
