DocumentCode :
3005888
Title :
Keynote address: Visual tools for security: Is there a there there?
Author :
Cheswick, B.
fYear :
2009
fDate :
11-11 Oct. 2009
Abstract :
It seems obvious: networks, software, authentication, and people have important and often complicated relationships and interactions. There´s far too much going on to keep track of all of it, but we know there are important devils down in the details. We know they are there. Though many have been chasing this dream of security visualization for a couple of decades, we don´t have that much to show for our efforts. We use NOCs and tools widely for managing large networks, but they get complicated fast. And most of the anomalous activity is weird but benign, leaving us awash in a sea of false positives. And those people in the NOCs seem totally resistant to 3D displays, data gloves, and other cool tools of our trade. What can we do? How can we help, really?
Keywords :
message authentication; 3D displays; data gloves; security visualization; visual tools;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Visualization for Cyber Security, 2009. VizSec 2009. 6th International Workshop on
Conference_Location :
Atlantic City, NJ
Print_ISBN :
978-1-4244-5413-6
Type :
conf
DOI :
10.1109/VIZSEC.2009.5375533
Filename :
5375533
Link To Document :
بازگشت