Security visualisation
It is proposed that this article be deleted because of the following concern:
If you can address this concern by improving, copyediting, sourcing, renaming, or merging the page, please edit this page and do so. You may remove this message if you improve the article or otherwise object to deletion for any reason. Although not required, you are encouraged to explain why you object to the deletion, either in your edit summary or on the talk page. If this template is removed, do not replace it. This message has remained in place for seven days, so the article may be deleted without further notice. Find sources: "Security visualisation" – news · newspapers · books · scholar · JSTOR Nominator: Please consider notifying the author/project: {{subst:proposed deletion notify|Security visualisation|concern=As per [[WP:OR]]}} ~~~~ Timestamp: 20151210050102 05:01, 10 December 2015 (UTC) Administrators: delete |

Security Visualisation is a subject that broadly covers the aspect of Big Data, Visualisation, human perception and Security. Each day, we are collecting more and more data in the form log files and it is often meaningless if the data is not analyzed thoroughly. Big Data mining techniques like Map Reduce help narrow down the search for meaning in vast data. Data visualisation is a data analytics technique, which is used to engage the human brain into finding patterns in data.
Recognition and cognition of patterns will lead to the recognition and cognition of anomalous patterns as well. Security Visualisation helps a security analyst identify imminent vulnerability and attacks in a network. Simple visualisations like bar charts and pie charts are naïve and unintuitive when it comes to Big Data. Special, customized visual techniques like choropleths and hive plots are often desired for effective communication of Big Data. The book "Applied Security Visualisation" is an in-depth study of the correlation between Security and Data Visualisation. [1]
Sophisticated Visualisations
Choropleth
Hive Plot
Force Diagram
Heatmap
TreeMap
References
- ^ Marty, Raffael (2008). Applied Security Visualization. Addison-Wesley Professional. Pearson Education. ISBN 0-321-51010-0.