{"title":"构建信息安全威胁可视化模型的方法","authors":"A. V. Manzhosov, I. Bolodurina","doi":"10.1109/AICT50176.2020.9368836","DOIUrl":null,"url":null,"abstract":"One of the most pressing tasks in the field of information security (IS) is the reduction of data processing time. Accurate and detailed data visualization optimizes the analysis process. The article proposes a method for visualizing the IS threat model, which reduce the amount of time to process the IS threat model. The classic way to display the IS threat model is a table. Processing the classical model of IS threats is quite laborious and takes a long time for IS analysts. In addition, there remains the risk of missing part of the information due to the large amount of data. The visualization method proposed in the article includes a two- and three-dimensional representation of the threat model. Such visualization reduces the data processing time for the analyst and can be applied in the field of information security management. The result of this work is an approach to visualization of the IS threat model that takes into account the spatio-temporal factor.","PeriodicalId":136491,"journal":{"name":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Method of Constructing a Visualization of Threat Model of Information Security\",\"authors\":\"A. V. Manzhosov, I. Bolodurina\",\"doi\":\"10.1109/AICT50176.2020.9368836\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the most pressing tasks in the field of information security (IS) is the reduction of data processing time. Accurate and detailed data visualization optimizes the analysis process. The article proposes a method for visualizing the IS threat model, which reduce the amount of time to process the IS threat model. The classic way to display the IS threat model is a table. Processing the classical model of IS threats is quite laborious and takes a long time for IS analysts. In addition, there remains the risk of missing part of the information due to the large amount of data. The visualization method proposed in the article includes a two- and three-dimensional representation of the threat model. Such visualization reduces the data processing time for the analyst and can be applied in the field of information security management. The result of this work is an approach to visualization of the IS threat model that takes into account the spatio-temporal factor.\",\"PeriodicalId\":136491,\"journal\":{\"name\":\"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AICT50176.2020.9368836\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 14th International Conference on Application of Information and Communication Technologies (AICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AICT50176.2020.9368836","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Method of Constructing a Visualization of Threat Model of Information Security
One of the most pressing tasks in the field of information security (IS) is the reduction of data processing time. Accurate and detailed data visualization optimizes the analysis process. The article proposes a method for visualizing the IS threat model, which reduce the amount of time to process the IS threat model. The classic way to display the IS threat model is a table. Processing the classical model of IS threats is quite laborious and takes a long time for IS analysts. In addition, there remains the risk of missing part of the information due to the large amount of data. The visualization method proposed in the article includes a two- and three-dimensional representation of the threat model. Such visualization reduces the data processing time for the analyst and can be applied in the field of information security management. The result of this work is an approach to visualization of the IS threat model that takes into account the spatio-temporal factor.