ABSTRACT

Data visualization is an indispensable means for analysis and communication, particularly in cyber security. Promising techniques and systems for cyber data visualization have emerged in the past decade, with applications ranging from threat and vulnerability analysis to forensics and network traffic monitoring. Cyber security needs visualization because security requires substantial human involvement. Even small organizations require constant time and attention from trained Security Information Workers (SIWs) to ensure acceptable levels of security. Threat analysis involves identifying and categorizing actions that could interrupt day-to-day operations. Given the complexity of visualizing graphs, each attack graph technique has relative strengths and limitations. SIWs may benefit from having several of the techniques at their disposal. In order to assess the security posture of the servers and workstations in their network, security analysts and systems administrators use vulnerability assessment tools to scan their network and deploy code for potential exploits.