TY - GEN
T1 - Introduction to visualization for computer security
AU - Goodall, J. R.
PY - 2008
Y1 - 2008
N2 - Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. Automated systems to combat this threat are one potential solution, but most automated systems require vigilant human oversight. This automated approach undervalues the strong analytic capabilities of humans. While automation affords opportunities for increased scalability, humans provide the ability to handle exceptions and novel patterns. One method to counteracting the ever increasing cyber threat is to provide the human security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. This is what visualization for computer security (VizSec) researchers and developers are doing. VizSec is about putting robust information visualization tools into the hands of humans to take advantage of the power of the human perceptual and cognitive processes in solving computer security problems. This chapter is an introduction to the VizSec research community and the papers in this volume.
AB - Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. Automated systems to combat this threat are one potential solution, but most automated systems require vigilant human oversight. This automated approach undervalues the strong analytic capabilities of humans. While automation affords opportunities for increased scalability, humans provide the ability to handle exceptions and novel patterns. One method to counteracting the ever increasing cyber threat is to provide the human security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. This is what visualization for computer security (VizSec) researchers and developers are doing. VizSec is about putting robust information visualization tools into the hands of humans to take advantage of the power of the human perceptual and cognitive processes in solving computer security problems. This chapter is an introduction to the VizSec research community and the papers in this volume.
UR - http://www.scopus.com/inward/record.url?scp=84890929497&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84890929497
SN - 9783540782421
T3 - VizSEC 2007 - Proceedings of the Workshop on Visualization for Computer Security
SP - 1
EP - 17
BT - VizSEC 2007 - Proceedings of the Workshop on Visualization for Computer Security
T2 - 4th International Workshop on Computer Security, VizSec 2007
Y2 - 29 October 2007 through 29 October 2007
ER -