首页> 外文会议>IEEE International Conference on Application of Information and Communication Technologies >Method of Constructing a Visualization of Threat Model of Information Security
【24h】

Method of Constructing a Visualization of Threat Model of Information Security

机译:构建信息安全威胁模型的可视化方法

获取原文

摘要

One of the most pressing tasks in the field of information security (IS) is the reduction of data processing time. Accurate and detailed data visualization optimizes the analysis process. The article proposes a method for visualizing the IS threat model, which reduce the amount of time to process the IS threat model. The classic way to display the IS threat model is a table. Processing the classical model of IS threats is quite laborious and takes a long time for IS analysts. In addition, there remains the risk of missing part of the information due to the large amount of data. The visualization method proposed in the article includes a two- and three-dimensional representation of the threat model. Such visualization reduces the data processing time for the analyst and can be applied in the field of information security management. The result of this work is an approach to visualization of the IS threat model that takes into account the spatio-temporal factor.
机译:信息安全领域中最紧迫的任务之一是数据处理时间的减少。准确且详细的数据可视化优化了分析过程。该文章提出了一种可视化是威胁模型的方法,这减少了处理是威胁模型的过程量。显示是威胁模型的经典方式是表。处理的经典模型是威胁是相当费力的,并且需要很长时间是分析师。此外,由于数据量大,仍然存在丢失部分信息的风险。本文中提出的可视化方法包括威胁模型的两维和三维表示。这种可视化减少了分析师的数据处理时间,并且可以应用于信息安全管理领域。这项工作的结果是一种旨在考虑到时空因素的威胁模型的可视化的方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号