Towards a Common Evaluation Framework for Cyber Security Visualizations
نویسندگان
چکیده
With the increasing number of cyber security visualization tools, literature has repeatedly highlighted the need for a common evaluation framework to help assessing and quantifying the effectiveness of proposed tools and validate their adequacy to targeted usages. However, there is no research yet that supports the development of such framework. We present a work in progress and preliminary ideas towards building a common evaluation framework for cyber security visualizations. Many authors have contributed to the state of the art of evaluation in the field of cyber security visualization. Staheli et al. [4] systematized a taxonomy for evaluable components, which have also been derived from evaluation work in other research fields. The methodologies described by Sethi et al. [3] and Suo et al. [5] reflect the different forms of an evaluation framework for cyber security visualization and methods to address its development. Moreover, through an analysis of research works from the VizSec venue, Staheli et al. [4] highlighted that among the forms of evaluation that are included in the selected works, some dimensions and evaluation techniques (e.g., psychophysiological methods) are not yet considered. This is especially because doing so would require knowledge that is not necessarily covered by the expertise of cyber security analysts. Besides, considering a target user’s requirements as evaluation metrics, as described by Sethi et al. [3], is undoubtedly an important form of evaluation but covers only qualitative aspects. In order to build a comprehensive framework, this could also be completed with other relevant aspects such as quantitative ones.
منابع مشابه
EEVi –Framework and Guidelines to Evaluate the Effectiveness of Cyber- Security Visualization
Cyber-security visualization aims to reduce security analysts’ workload by presenting information as visual analytics instead of a string of text and characters. However, the adoption of the resultant visualizations by security analysts, is not widespread. The literature indicates a lack of guidelines and standardized evaluation techniques for effective visualization in cyber-security, as a rea...
متن کاملModeling Cyber-Insurance: Towards a Unifying Framework
We propose a comprehensive formal framework to classify all market models of cyber-insurance we are aware of. The framework features a common terminology and deals with the specific properties of cyber-risk in a unified way: interdependent security, correlated risk, and information asymmetries. A survey of existing models, tabulated according to our framework, reveals a discrepancy between info...
متن کاملAn Authorization Framework for Database Systems
Today, data plays an essential role in all levels of human life, from personal cell phones to medical, educational, military and government agencies. In such circumstances, the rate of cyber-attacks is also increasing. According to official reports, data breaches exposed 4.1 billion records in the first half of 2019. An information system consists of several components, which one of the most im...
متن کاملPsychological Factors Affecting on the Culture and Awareness of Cyber Security in During of Covid-19 Outbreak
The aim of this study was to investigate the psychological factors affecting the culture and awareness of cyber security in the period of Covid-19 outbreak by qualitative method and theme analysis. Research data from upstream documents that include all valid articles published in 2020 to 2022 inside and outside the country, with 4 keywords (culture, awareness, cyber security, psychological fact...
متن کاملTowards a Framework for Assuring Cyber Physical System Security
Today, cyber physical systems (CPS) are becoming popular in power networks, healthcare devices, transportation networks, industrial process and infrastructures. As cyber physical systems are used more and more extensively and thoroughly, security of cyber physical systems has become the utmost important concern in system design, implementation and research. Many kinds of attacks arise (e.g. the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017