Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Using Geographic Information Systems for Enhanced Security Visualization Matthew.

Slides:



Advertisements
Similar presentations
NAGIOS AND CACTI NETWORK MANAGEMENT AND MONITORING SYSTEMS.
Advertisements

Accelerating The Application Lifecycle. DEPLOY DEFINE DESIGN TEST DEVELOP CHANGE MANAGEMENT Application Lifecycle Management #1 in Java Meta, Giga, Gartner.
Security Administration Tools and Practices Amit Bhan Usable Privacy and Security.
Components of GIS.
Tablet Computers and Standards of Learning Testing: Insights from the Virginia Department of Education Monday, August 12, 2013.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Multimedia Communications Tejinder Judge Usable Security – CS 6204 – Fall, 2009.
The Most Analytical and Comprehensive Defense Network in a Box.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Childcare Study Edgardo & Zalia Usable Security – CS 6204 – Fall, 2009 – Dennis.
© 2005 by Prentice Hall Appendix 2 Automated Tools for Systems Development Modern Systems Analysis and Design Fourth Edition Jeffrey A. Hoffer Joey F.
SC2 meeting 24 November 2014 Security Measures and Resources Toolbox
Using Geographic Information Systems and the World Wide Web for Interactive Transit Trip Itinerary Planning Brian Smith Center for Transportation Studies.
S5-1 © 2001 Carnegie Mellon University OCTAVE SM Process 5 Identify Key Components Software Engineering Institute Carnegie Mellon University Pittsburgh,
MD703 Class 8 DRAFT Agenda Midterm Return and Review –The Big Fix Discussion Application Integration –Workflow –EAI –Service Oriented Architecture Chapters.
IS 425 Enterprise Information LECTURE 4 Winter
The UC Berkeley Calendar Network Final Master’s Project Allison Bloodworth Nadine Fiebrich Myra Liu Zhanna Shamis.
U.C. Berkeley Calendar Network Usability Evaluation Nadine Fiebrich & Myra Liu IS214 May 4, 2004.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 11 Management Decision Making.
Monitoring and Reporting Performance Metrics
Protection Through Software and Services James Hamilton General Manager Microsoft Corporation.
Developing Conservation Data Sharing Tools for the Island of Maui, Hawai‘i Samuel N.R. Aruch MGIS- Capstone.
© 2005 by Prentice Hall Appendix 2 Automated Tools for Systems Development Modern Systems Analysis and Design Fourth Edition Jeffrey A. Hoffer Joey F.
CPM -200: Principles of Schedule Management IPM 2002 Fall Conference PMI-College of Performance Management – Professional Education.
Winter Consolidated Server Deployment Guide for Hosted Messaging and Collaboration version 3.5 Philippe Maurent Principal Consultant Microsoft.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy Preferences Edgardo Vega Usable Security – CS 6204 – Fall, 2009 – Dennis.
1 Test and Evaluation Kristen Barrera 711 HPW/RHA
Most Important Factors in Choosing a Reporting Platform Tyler Wilchek Marketing Manager Randy Messing Sr. Engineer Boxtone Greg Harris Sr. Product Manager.
Appendix 2 Automated Tools for Systems Development © 2006 ITT Educational Services Inc. SE350 System Analysis for Software Engineers: Unit 2 Slide 1.
November 17, Critical Risk Identification System (CRIS) United States Department of Agriculture Office of Homeland Security & Emergency Coordination.
The Most Analytical and Comprehensive Defense Network in a Box.
 Computer Aided Software Engineering  The use of a computer system to aid in the creation of software  Used to reduce the amount of time required for.
Usability Studies Encryption Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Why Johnnys' Network got Owned by Evil Hackers Bent on World Domination and Johnny.
Tutorial 1 Getting Started with Adobe Dreamweaver CS3
1 6th EC/GIS workshop - Lyon - June 2000 Easy and friendly access to geographic information for mobile users David HELLO (Matra.
Information Visualization for Intrusion Detection Analysis: A Needs Assessment of Security Experts John Goodall, Anita Komlodi, Wayne G. Lutters UMBC Workshop.
Melissa Armstrong – Sponsor Dr. Eck Doerry – Mentor Greg Andolshek Alex Koch Michael McCormick Department of Computer Science SolutionProblemDesign User.
9/24/2001OKI Tool Developers © MIT Principles and Criteria Michael D. Barker The MIT Educational Media Creation Center September 2001.
University of Palestine Faculty of Engineering and Urban planning Software Engineering department Software Engineering Group Project Requirements Project.
©2015 EarthLink. All rights reserved Cloud Express ™ Optimize Your Business & Cloud Networks.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Designing for Privacy Human factors and system’s engineering Usable Security – CS.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Derek Reinelt Team Manager Angela Lam Design Jake Sanders Development Padma Vaithyam User Testing.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Graphical Passwords Possible Collaborative Project Usable Security – CS 6204 – Fall,
1 SY DE 542 Navigation and Organization Prototyping Basics Feb 28, 2005 R. Chow
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Reporting and Analysis With Microsoft Office. Reporting and Analysis Business User Reporting & Analysis OLAP Data Warehouse.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
1 TOWER CONSTRUCTION NOTIFICATION SYSTEM ENHANCEMENTS March 30, :00 PM Room 6-B516 of the Portals II Building 445 Twelfth Street, SW Washington,
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Policy Authoring Matthew Dunlop Usable Security – CS 6204 – Fall, 2009 – Dennis.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Semantic Web Standards Presented By: Matthew Dunlop Usable Security – CS 6204 –
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Internet History Computer Networks.
How to Research and Present Assessment 2. Three Websites You have to choose three websites that make use of social media to increase awareness and traffic.
5. 2Object-Oriented Analysis and Design with the Unified Process Objectives  Describe the activities of the requirements discipline  Describe the difference.
Evaluating GIS for Disaster Management Bruce Kinner GEOG 596A.
CHAPTER 7 Operating System Copyright © Cengage Learning. All rights reserved.
MSU Cognos Future Data Services September Cognos Improvements  Architecture  64- bit vs 32- bit  More server power, faster servers  Ghost.
Hossein Haghighat Sabet CRM Consultant |
Appendix 2 Automated Tools for Systems Development
Reporting and Analysis With Microsoft Office
Access Security Integrator
Business System Development
Chapter 18 MobileApp Design
Object-oriented design for multiple classes
Top Reasons to Choose Android Today. Over the years the Android OS has progressed largely by acquiring major percent of global market share. A number.
Top Reasons to Choose Android Today. Over the years the Android OS has progressed largely by acquiring major percent of global market share. A number.
Social Navigation as a Model for Usable Security
Interactive media.
Accessible Design Top 10 List
Presentation transcript:

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Using Geographic Information Systems for Enhanced Security Visualization Matthew Dunlop David Shelly Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Agenda Purpose Problem Study  Design  Results Prototype Future Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech

Purpose To design a usable security visualization prototype tool that leverages global information systems (GIS)  Present security information more clearly  Facilitate rapid identification of network security shortcomings  Allow better protection of critical network assets

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Problem Information overload  VT processes over 5 million s per day  Manages over 500 SMTP & 3500 HTTP servers Analysts rely on multiple tools  Analysis takes more time Popular tools are not very usable  Primarily text based  Do not scale well for large networks  Graphical representations are not intuitive GIS adds context as well as scalability

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Current Security Tools – Text-based Snort Wireshark

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Current Security Tools – Graphical The Network Visualizer Rumint

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Study Design - Participants Virginia Tech system administrators SANS IT professionals U.S. Army network engineers 50 respondents

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Study Design – Question Areas Background Information System Information Security Information Security Tools GIS Information

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Study Results – Background

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Study Results - Preferences Top usability improvements  Improved user interface  Better summary of information  Improved visual representation Other findings  Prefer customizability  Multiple tools = longer time to isolate threats Most important aspects of security tools

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Study Results - Visualization Visualization not widely used  50% never used it to visualize networks  76% never used it to visualize security Openness to GIS visualization  76% feel GIS tool would be useful for network visualization  50% envision using it for security visualization Helpful in explaining security to technical and nontechnical audiences

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Prototype Design Color-coded security status Device details Filtering options Ability to drill down

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Detailed View

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Future Work Build working model of prototype Conduct usability study

Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Questions