Skip to main content

Method of Constructing a Graphic Model of the Regulatory and Legal Framework in the Sphere of Information Security

  • 311 Accesses

Part of the Communications in Computer and Information Science book series (CCIS,volume 1534)

Abstract

Data visualization in the field of information security (IS) is becoming an urgent task. The more informative the visual display for the analyst, the faster and better he will be able to get the result. The visualization method described in the article allows to reduce the time needed for determination the actual IS threats when processing the IS threat model. In the classic way of displaying, threat models are a list or a table of several tens of printed pages. To process such a volume of data, information security analysts need to spend a lot of time. It remains likely that the analyst will lose sight of important data. The article proposes a method for visualizing the spatio-temporal model of IS threats in three-dimensional and two-dimensional form. When visualizing a threat model, a surface with axes is used: time, risk, information asset. The proposed visualization of the IS threat model allows the analyst to identify current threats in less time. Scope - management of information security. The result of this work is a way to visualize the IS threat model, taking into account the spatio-temporal factor.

Keywords

  • Information security
  • Spatio-temporal model of information security threats; visualization
  • Graphic model

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-030-96040-7_4
  • Chapter length: 15 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   109.00
Price excludes VAT (USA)
  • ISBN: 978-3-030-96040-7
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   149.99
Price excludes VAT (USA)
Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.
Fig. 7.
Fig. 8.

References

  1. Zhang, J.: A logic-based representation and tree-based visualization method for building regulatory requirements. Visual. Eng. 5(1), 1–14 (2017)

    CrossRef  Google Scholar 

  2. Innar, L., Anton, V., Ermo, T.: Visualization and structure analysis of legislative acts: a case study on the law of obligations. In: ICAIL 2007: Proceedings of the 11th International Conference on Artificial Intelligence and Law, pp. 189–190 (2007)

    Google Scholar 

  3. Josef, K., Luka, S.: Visualization of Inter-Communication in Normative-Legal Documents and Automated Design of Analysis in Reference-Legal Systems. Moscow State University, 8–10 (2016)

    Google Scholar 

  4. Mohammad, H., Abdelwahab, H.: Citation analysis: an approach for facilitating the understanding and the analysis of regulatory compliance documents. In: Sixth International Conference on Information Technology: New Generations (2009)

    Google Scholar 

  5. Applying Graph Centrality Metrics in Visual Analytics of Scientific Standard Datasets. https://www.mdpi.com/2073-8994/11/1/30/htm. Accessed 20 Aug 2021

  6. Timo S.: Anomaly detection in log data using graph databases and machine learning to defend advanced persistent threats. In: Lecture Notes in Informatics (2017)

    Google Scholar 

  7. Weihua, C., Lijun, C., Xiaotang, C., Kaiqi, H.: An equalized global graph model-based approach for multicamera object tracking. IEEE Trans. Circuits Syst. Video Technol. 27(11), 2367–2381 (2017)

    CrossRef  Google Scholar 

  8. Baeza-Yates, R., Ribeiro-Neto, B.: Modern Information Retrieval: The Concepts and Technology behind Search. ACM Press Books, New-York (1999)

    Google Scholar 

  9. Manning, K.D., Raghavan, P., Schütze, H.: An Introduction to Information Retrieval. Williams Publishing House, Moscow (2011)

    MATH  Google Scholar 

  10. Greiff W.R.: A theory of term weighting based on exploratory data analysis. In: Proceedings of the 21st annual international ACM SIGIR conference on Research and development in information retrieval. ACM, pp. 11–19 (1998)

    Google Scholar 

  11. Kuzichev A.S: Venn Diagrams. History and Application, Publishing house “Science”, Moscow (1968)

    Google Scholar 

  12. Bondy, J.A., Murty, S.R.: Graph Theory with Applications. The Macmillan Press Ltd., Ontario, Canada (1976)

    CrossRef  Google Scholar 

  13. Information technology to support the life cycle of products. Functional Modeling Methodology. https://docs.cntd.ru/document/1200028629. Accessed 230 Aug 2021

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Verify currency and authenticity via CrossMark

Cite this paper

Manzhosov, A.V., Bolodurina, I.P. (2022). Method of Constructing a Graphic Model of the Regulatory and Legal Framework in the Sphere of Information Security. In: Woungang, I., Dhurandher, S.K., Pattanaik, K.K., Verma, A., Verma, P. (eds) Advanced Network Technologies and Intelligent Computing. ANTIC 2021. Communications in Computer and Information Science, vol 1534. Springer, Cham. https://doi.org/10.1007/978-3-030-96040-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-96040-7_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-96039-1

  • Online ISBN: 978-3-030-96040-7

  • eBook Packages: Computer ScienceComputer Science (R0)