Abstract
Data visualization in the field of information security (IS) is becoming an urgent task. The more informative the visual display for the analyst, the faster and better he will be able to get the result. The visualization method described in the article allows to reduce the time needed for determination the actual IS threats when processing the IS threat model. In the classic way of displaying, threat models are a list or a table of several tens of printed pages. To process such a volume of data, information security analysts need to spend a lot of time. It remains likely that the analyst will lose sight of important data. The article proposes a method for visualizing the spatio-temporal model of IS threats in three-dimensional and two-dimensional form. When visualizing a threat model, a surface with axes is used: time, risk, information asset. The proposed visualization of the IS threat model allows the analyst to identify current threats in less time. Scope - management of information security. The result of this work is a way to visualize the IS threat model, taking into account the spatio-temporal factor.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhang, J.: A logic-based representation and tree-based visualization method for building regulatory requirements. Visual. Eng. 5(1), 1–14 (2017)
Innar, L., Anton, V., Ermo, T.: Visualization and structure analysis of legislative acts: a case study on the law of obligations. In: ICAIL 2007: Proceedings of the 11th International Conference on Artificial Intelligence and Law, pp. 189–190 (2007)
Josef, K., Luka, S.: Visualization of Inter-Communication in Normative-Legal Documents and Automated Design of Analysis in Reference-Legal Systems. Moscow State University, 8–10 (2016)
Mohammad, H., Abdelwahab, H.: Citation analysis: an approach for facilitating the understanding and the analysis of regulatory compliance documents. In: Sixth International Conference on Information Technology: New Generations (2009)
Applying Graph Centrality Metrics in Visual Analytics of Scientific Standard Datasets. https://www.mdpi.com/2073-8994/11/1/30/htm. Accessed 20 Aug 2021
Timo S.: Anomaly detection in log data using graph databases and machine learning to defend advanced persistent threats. In: Lecture Notes in Informatics (2017)
Weihua, C., Lijun, C., Xiaotang, C., Kaiqi, H.: An equalized global graph model-based approach for multicamera object tracking. IEEE Trans. Circuits Syst. Video Technol. 27(11), 2367–2381 (2017)
Baeza-Yates, R., Ribeiro-Neto, B.: Modern Information Retrieval: The Concepts and Technology behind Search. ACM Press Books, New-York (1999)
Manning, K.D., Raghavan, P., Schütze, H.: An Introduction to Information Retrieval. Williams Publishing House, Moscow (2011)
Greiff W.R.: A theory of term weighting based on exploratory data analysis. In: Proceedings of the 21st annual international ACM SIGIR conference on Research and development in information retrieval. ACM, pp. 11–19 (1998)
Kuzichev A.S: Venn Diagrams. History and Application, Publishing house “Science”, Moscow (1968)
Bondy, J.A., Murty, S.R.: Graph Theory with Applications. The Macmillan Press Ltd., Ontario, Canada (1976)
Information technology to support the life cycle of products. Functional Modeling Methodology. https://docs.cntd.ru/document/1200028629. Accessed 230 Aug 2021
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this paper
Cite this paper
Manzhosov, A.V., Bolodurina, I.P. (2022). Method of Constructing a Graphic Model of the Regulatory and Legal Framework in the Sphere of Information Security. In: Woungang, I., Dhurandher, S.K., Pattanaik, K.K., Verma, A., Verma, P. (eds) Advanced Network Technologies and Intelligent Computing. ANTIC 2021. Communications in Computer and Information Science, vol 1534. Springer, Cham. https://doi.org/10.1007/978-3-030-96040-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-96040-7_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-96039-1
Online ISBN: 978-3-030-96040-7
eBook Packages: Computer ScienceComputer Science (R0)