Educause Security Discussion mailing list archives
Re: Visual Interpretation of Internet Threats
From: Ozzie Paez <ozpaez () SPRYNET COM>
Date: Thu, 29 Nov 2007 09:40:43 -0700
Connie, A good book on metrics, including visualization, is Security Metrics from Andrew Jaquith. You might be able to get some samples by visiting his web site at http://www.securitymetrics.org/content/Wiki.jsp and asking him through his Blog. One issue to keep in mind is the audience itself and its ability to understand what they are seeing. There are network maps of virus and Trojan infections, which are visually very powerful, but need either some understanding by your audience or description support to translate the visual into non-techie terms. Finally, a good visual to have is what happens inside a network when an infection breaks in, something that is normally measured, for example, by numbers of attempts by Trojans to send out infected e-mails from within the network. In other words, giving the community a view of the threat from the outside and what happens on the inside when there is a breach. Hope it helps, Ozzie Paez SSE/CISSP SAIC 303-332-5363 -----Original Message----- From: Sadler, Connie [mailto:Connie_Sadler () BROWN EDU] Sent: Thursday, November 29, 2007 7:14 AM To: SECURITY () LISTSERV EDUCAUSE EDU Subject: [SECURITY] Visual Interpretation of Internet Threats This may be a strange request, but I'm wondering if anyone knows of attempts to make visuals of Internet threats. One of the big issues we face is the fact that people don't see the threats, and what they don't see, they don't take seriously. Metrics help, demos help, and good stories help, but if anyone knows of some visuals that can help people to actually "see" the threat, or a representation of the threat, I'd LOVE to hear about it. This might be a good student project?? ;-) Thanks... Connie J. Sadler, CM, CISSP, CISM, GIAC GSLC IT Security Officer, Brown University Campus Box 1885, Providence, RI 02912 Connie_Sadler () Brown edu, Office: 401-863-7266 PGP Key: http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x91E38EFB PGP Fingerprint: DA5F ED84 06D7 1635 4BC7 560D 9A07 80BA 91E3 8EFB
Current thread:
- Visual Interpretation of Internet Threats Sadler, Connie (Nov 29)
- <Possible follow-ups>
- Re: Visual Interpretation of Internet Threats Aaron Wade (Nov 29)
- Re: Visual Interpretation of Internet Threats Kathy Bergsma (Nov 29)
- Re: Visual Interpretation of Internet Threats Gary Flynn (Nov 29)
- Re: Visual Interpretation of Internet Threats Brent Sweeny (Nov 29)
- Re: Visual Interpretation of Internet Threats Peter Charbonneau (Nov 29)
- Re: Visual Interpretation of Internet Threats Hull, Dave (Nov 29)
- Re: Visual Interpretation of Internet Threats Ozzie Paez (Nov 29)
- Re: Visual Interpretation of Internet Threats Willis Marti (Nov 29)
- Re: Visual Interpretation of Internet Threats Jay Tumas (Nov 29)
- Re: Visual Interpretation of Internet Threats Basgen, Brian (Nov 29)
- Re: Visual Interpretation of Internet Threats John McNair (Nov 29)