Skip to main content

Method of Constructing a Graphic Model of the Regulatory and Legal Framework in the Sphere of Information Security

  • Conference paper
  • First Online:
Advanced Network Technologies and Intelligent Computing (ANTIC 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1534))

  • 943 Accesses

Abstract

Data visualization in the field of information security (IS) is becoming an urgent task. The more informative the visual display for the analyst, the faster and better he will be able to get the result. The visualization method described in the article allows to reduce the time needed for determination the actual IS threats when processing the IS threat model. In the classic way of displaying, threat models are a list or a table of several tens of printed pages. To process such a volume of data, information security analysts need to spend a lot of time. It remains likely that the analyst will lose sight of important data. The article proposes a method for visualizing the spatio-temporal model of IS threats in three-dimensional and two-dimensional form. When visualizing a threat model, a surface with axes is used: time, risk, information asset. The proposed visualization of the IS threat model allows the analyst to identify current threats in less time. Scope - management of information security. The result of this work is a way to visualize the IS threat model, taking into account the spatio-temporal factor.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhang, J.: A logic-based representation and tree-based visualization method for building regulatory requirements. Visual. Eng. 5(1), 1–14 (2017)

    Article  Google Scholar 

  2. Innar, L., Anton, V., Ermo, T.: Visualization and structure analysis of legislative acts: a case study on the law of obligations. In: ICAIL 2007: Proceedings of the 11th International Conference on Artificial Intelligence and Law, pp. 189–190 (2007)

    Google Scholar 

  3. Josef, K., Luka, S.: Visualization of Inter-Communication in Normative-Legal Documents and Automated Design of Analysis in Reference-Legal Systems. Moscow State University, 8–10 (2016)

    Google Scholar 

  4. Mohammad, H., Abdelwahab, H.: Citation analysis: an approach for facilitating the understanding and the analysis of regulatory compliance documents. In: Sixth International Conference on Information Technology: New Generations (2009)

    Google Scholar 

  5. Applying Graph Centrality Metrics in Visual Analytics of Scientific Standard Datasets. https://www.mdpi.com/2073-8994/11/1/30/htm. Accessed 20 Aug 2021

  6. Timo S.: Anomaly detection in log data using graph databases and machine learning to defend advanced persistent threats. In: Lecture Notes in Informatics (2017)

    Google Scholar 

  7. Weihua, C., Lijun, C., Xiaotang, C., Kaiqi, H.: An equalized global graph model-based approach for multicamera object tracking. IEEE Trans. Circuits Syst. Video Technol. 27(11), 2367–2381 (2017)

    Article  Google Scholar 

  8. Baeza-Yates, R., Ribeiro-Neto, B.: Modern Information Retrieval: The Concepts and Technology behind Search. ACM Press Books, New-York (1999)

    Google Scholar 

  9. Manning, K.D., Raghavan, P., Schütze, H.: An Introduction to Information Retrieval. Williams Publishing House, Moscow (2011)

    MATH  Google Scholar 

  10. Greiff W.R.: A theory of term weighting based on exploratory data analysis. In: Proceedings of the 21st annual international ACM SIGIR conference on Research and development in information retrieval. ACM, pp. 11–19 (1998)

    Google Scholar 

  11. Kuzichev A.S: Venn Diagrams. History and Application, Publishing house “Science”, Moscow (1968)

    Google Scholar 

  12. Bondy, J.A., Murty, S.R.: Graph Theory with Applications. The Macmillan Press Ltd., Ontario, Canada (1976)

    Book  Google Scholar 

  13. Information technology to support the life cycle of products. Functional Modeling Methodology. https://docs.cntd.ru/document/1200028629. Accessed 230 Aug 2021

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Manzhosov, A.V., Bolodurina, I.P. (2022). Method of Constructing a Graphic Model of the Regulatory and Legal Framework in the Sphere of Information Security. In: Woungang, I., Dhurandher, S.K., Pattanaik, K.K., Verma, A., Verma, P. (eds) Advanced Network Technologies and Intelligent Computing. ANTIC 2021. Communications in Computer and Information Science, vol 1534. Springer, Cham. https://doi.org/10.1007/978-3-030-96040-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-96040-7_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-96039-1

  • Online ISBN: 978-3-030-96040-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics