Skip to main content
Top

2016 | OriginalPaper | Chapter

Cyber Operator Perspectives on Security Visualization

Authors : Anita D’Amico, Laurin Buchanan, Drew Kirkpatrick, Paul Walczak

Published in: Advances in Human Factors in Cybersecurity

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In a survey of cyber defense practitioners, we presented 39 assertions about the work cyber operators do, data sources they use, and how they use or could use cyber security visual presentations. The assertions were drawn from prior work in cyber security visualization over 15 years. Our goal was to determine if these assertions are still valid for today’s cyber operators. Participants included industry, government and academia experts with real experience in the cyber domain. Results validated the assertions, which will serve as a foundation for follow-on security visualization research. Feedback also indicates that when analyzing a security situation, cyber operators inspect large volumes of data, usually in alpha-numeric format, and try to answer a series of analytic questions, expending considerable cognitive energy. Operators believe security visualizations could support their analysis and communication of findings, as well as training new operators.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Cyber Visions 2024, United States Air Force Cyberspace Science and Technology Vision 2012-2025 AF/ST TR 12-01, pp. 28–29 (2012) Cyber Visions 2024, United States Air Force Cyberspace Science and Technology Vision 2012-2025 AF/ST TR 12-01, pp. 28–29 (2012)
2.
go back to reference Bennett, K.B., Flach, J.M.: Display and interface design: subtle science, exact art. CRC Press, Boca Raton (2011) Bennett, K.B., Flach, J.M.: Display and interface design: subtle science, exact art. CRC Press, Boca Raton (2011)
3.
go back to reference Sawyer, B.D., Finomore, V.S., Funke, G.J., Mancuso, V.F., Funke, M.E., Matthews, G., Warm, J.S.: Cyber vigilance: effects of signal probability and event rate. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 58, no. 1, pp. 1771–1775 (2014) Sawyer, B.D., Finomore, V.S., Funke, G.J., Mancuso, V.F., Funke, M.E., Matthews, G., Warm, J.S.: Cyber vigilance: effects of signal probability and event rate. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 58, no. 1, pp. 1771–1775 (2014)
4.
go back to reference Rasmussen, J., Ehrlich, K., Ross, S., Kirk, S., Gruen, D., Patterson, J.: Nimble cybersecurity incident management through visualization and defensible recommendations. In: Proceedings of the Seventh International Symposium on Visualization for Cyber Security, ACM, pp. 102–113 (2010) Rasmussen, J., Ehrlich, K., Ross, S., Kirk, S., Gruen, D., Patterson, J.: Nimble cybersecurity incident management through visualization and defensible recommendations. In: Proceedings of the Seventh International Symposium on Visualization for Cyber Security, ACM, pp. 102–113 (2010)
5.
go back to reference Paul, C.L.K., Whitley, K.: A taxonomy of cyber awareness questions for the user-centered design of cyber situation awareness. In: Human Aspects of Information Security, Privacy, and Trust, (2013) Paul, C.L.K., Whitley, K.: A taxonomy of cyber awareness questions for the user-centered design of cyber situation awareness. In: Human Aspects of Information Security, Privacy, and Trust, (2013)
6.
go back to reference U.S. Department of Defense, Chairman of the Joint Chiefs of Staff Manual, Cyber Incident Handling Program: CJCSM 6510.01B, 10 July 2012 (Directive Current as of 18 Dec 2014) U.S. Department of Defense, Chairman of the Joint Chiefs of Staff Manual, Cyber Incident Handling Program: CJCSM 6510.01B, 10 July 2012 (Directive Current as of 18 Dec 2014)
7.
go back to reference D’Amico, A., Tesone, D., Whitley, K., O’Brien, B., Smith, M., Roth, E.: “Understanding the cyber defender: a cognitive task analysis of information assurance analysts”. In: Report CSA-CTA-1-1 under Contract No. F30602-03-C-0260 issued by USAF, AFMC Air Force Research Laboratory (2005) D’Amico, A., Tesone, D., Whitley, K., O’Brien, B., Smith, M., Roth, E.: “Understanding the cyber defender: a cognitive task analysis of information assurance analysts”. In: Report CSA-CTA-1-1 under Contract No. F30602-03-C-0260 issued by USAF, AFMC Air Force Research Laboratory (2005)
8.
go back to reference D’Amico, A., Whitley, K., Tesone, D., O’Brien, B., Roth, E.: Achieving cyber defense situational awareness: a cognitive task analysis of information assurance analysts. In: Proceedings of the Human Factors and Ergonomics Society 49th Annual Meeting, pp. 229–233 (2005) D’Amico, A., Whitley, K., Tesone, D., O’Brien, B., Roth, E.: Achieving cyber defense situational awareness: a cognitive task analysis of information assurance analysts. In: Proceedings of the Human Factors and Ergonomics Society 49th Annual Meeting, pp. 229–233 (2005)
9.
go back to reference D’Amico, A., Kocka, M.: Information assurance visualizations for specific stages of situational awareness and intended uses: lessons learned. In: Proceedings of Workshop on Visualization for Computer Security (VizSec), pp. 107–112 (2005) D’Amico, A., Kocka, M.: Information assurance visualizations for specific stages of situational awareness and intended uses: lessons learned. In: Proceedings of Workshop on Visualization for Computer Security (VizSec), pp. 107–112 (2005)
10.
go back to reference Mahoney, S., et al.: A cognitive task analysis for cyber situational awareness. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 54, no. 4, SAGE Publications (2010) Mahoney, S., et al.: A cognitive task analysis for cyber situational awareness. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 54, no. 4, SAGE Publications (2010)
11.
go back to reference Erbacher, R.F., et al.: A multi-phase network situational awareness cognitive task analysis. Inf. Vis. 9(3), 204–219 (2010)CrossRef Erbacher, R.F., et al.: A multi-phase network situational awareness cognitive task analysis. Inf. Vis. 9(3), 204–219 (2010)CrossRef
12.
go back to reference Buchanan, L., D’Amico, A., Horn, C., Walczak, P.: NetDemon Final Report. Naval Network Defense Decision Making Model (N2D2M2), under Contract No. N00014-10-C-0374 issued by Office of Naval Research (2011) Buchanan, L., D’Amico, A., Horn, C., Walczak, P.: NetDemon Final Report. Naval Network Defense Decision Making Model (N2D2M2), under Contract No. N00014-10-C-0374 issued by Office of Naval Research (2011)
15.
go back to reference Langton, J.T., Newey, B.: Evaluation of current visualization tools for cyber security. In: Proceedings SPIE 7709, Cyber Security, Situation Management, and Impact Assessment II; and Visual Analytics for Homeland Defense and Security II, 770910 (2010) Langton, J.T., Newey, B.: Evaluation of current visualization tools for cyber security. In: Proceedings SPIE 7709, Cyber Security, Situation Management, and Impact Assessment II; and Visual Analytics for Homeland Defense and Security II, 770910 (2010)
16.
go back to reference Staheli, D., et al.: Visualization evaluation for cyber security: trends and future directions. In: Proceedings of the Eleventh Workshop on Visualization for Cyber Security. ACM, (2014) Staheli, D., et al.: Visualization evaluation for cyber security: trends and future directions. In: Proceedings of the Eleventh Workshop on Visualization for Cyber Security. ACM, (2014)
Metadata
Title
Cyber Operator Perspectives on Security Visualization
Authors
Anita D’Amico
Laurin Buchanan
Drew Kirkpatrick
Paul Walczak
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-41932-9_7

Premium Partner