Chapter

Visualization for Computer Security

Volume 5210 of the series Lecture Notes in Computer Science pp 136-143

Wireless Cyber Assets Discovery Visualization

  • Kenneth ProleAffiliated withSecure Decisions division of Applied Visions, Inc.
  • , John R. GoodallAffiliated withSecure Decisions division of Applied Visions, Inc.
  • , Anita D. D’AmicoAffiliated withSecure Decisions division of Applied Visions, Inc.
  • , Jason K. KopylecAffiliated withSecure Decisions division of Applied Visions, Inc.

* Final gross prices may vary according to local VAT.

Get Access

Abstract

As wireless networking has become near ubiquitous, the ability to discover, identify, and locate mobile cyber assets over time is becoming increasingly important to information security auditors, penetration testers, and network administrators. We describe a new prototype called MeerCAT (Mobile Cyber Asset Tracks) for visualizing wireless assets, including their location, security attributes, and relationships. This paper highlights our latest iteration of our prototype for visual analysis of wireless asset data, including user requirements and the various coordinated visualizations.

Keywords

Visual analytics wireless discovery wireless security coordinated views geographic visualization information visualization wardriving