Anton Chuvakin points to this funny link about visualization. Especially the statement:
"Chart-based encryption -- data goes in, no information comes out" is funny. This is worth keeping in mind when thinking about what to visualize in a security setting. In my work we want to visualize potential intrusion activities and attacks at a network level. We want to give the user a situational picture ("Lägesbild " in Swedish) of the activities at different nodes in the network. In order to do that, we have to use visualization to communicate in an understandable way.
Showing posts with label visualization. Show all posts
Showing posts with label visualization. Show all posts
Monday, June 25, 2007
Visualization
Labels:
blog entry,
data mining,
intrusion detection,
visualization
Subscribe to:
Posts (Atom)