SlideShare a Scribd company logo
Data Visualizations in
Cyber Security:
Still Home of the WOPR?
Confidential and Proprietary
Bsides Las Vegas 2017
Matthew Park
2
Who Am I?
MATTHEW PARK
 User Experience Lead
 Background in Big Data and
Video Games Design
 @muted_counts
 mpark@endgame.com
3Confidential and Proprietary
4
Home of the
WOPR?
Hollywood
fiction at it’s
finest.
Learn DAMMIT LEARN
5
The Life of an
Actual SOC
Analyst
5 /70 Alerts 30 /250 Alerts 150 /8,173 Alerts
Raffael Marty
Author of Applied
Security Visualization
“The general problem plaguing security
visualizations today…they are either the work of
designers with no background in security, or of
security professionals who don’t understand data
visualizations.”
7
Comfort Zones
Example
Where analysts
tends to lean
towards
8
Comfort Zones
Example
How visualizations
can find that
needle in the
haystack
Let’s Talk
Attack
Timelines
How Amazing is WarGames?
The General Problems with
Visualizations in Security
Let’s Talk Attack Timelines
Discovery / Recognizing our
Biases / User Testing
Persona Creation / Design
Requirements
Concepting / Basics of Design
Structures
Prototyping / Looking Ahead
End of the appetizer,
time for the entrée.
10
Three Stages
Discovery
Confirming/disproving biases,
understanding our users, capturing
organizational workflows
Concept
Creating a basic foundation from known design
patterns, Creating new design requirements
from our users
Prototyping and User Testing
Feature creation and taking it back into the ‘wild’
for testing
User-Centric Design
11
Discovery
Phase
Definition and
Recognizing our
Biases
Experience Time Differentiation
• Lack of security
expertise
• Lack of platform
domain experience
• Limited time to
review alerts and
incidents
• Forced to make
informed
decisions quickly
• Forces conformity
• Requires level of
expertise to extract
value
12
User-centric Design Study
 GOAL: Capture team dynamics and worker roles within security
organization to identify challenges common across security teams
User
Group
Team Type Environment Collection
Method
A Traditional SOC Individuals Day-to-day use User interviews
B Novice Training Team Mock Scenario Side-by-side
monitoring,
Retrospective &
User interviews
C Internal Red vs. Blue Mock Scenario Mirrored Scenario
as User Group B
13
 Have little to no prior experience (average of 1 year)
in the cyber security space. First line of defense in a
Security Operations Center.
 Main responsibility is to initially triage alerts and
determine if escalation (to higher tiered) is required.
 Primarily rely on a platform’s GUI.
Tier 1
Analyst
Tier 3
Analyst
Forensic
Hunter
 Intimately understand network and platform architecture.
 Seen as domain experts on the SOC team and more
comfortable working through the command line.
 Investigates escalated alerts, and determine root causes
and extent to remediate problems.
 Expert in EDR platforms and sophisticated
investigation tools
 Uses command line and scripting languages to
bypass UI and collect large data feeds using 3rd
party APIs.
SOC
Manager
 Skilled security practitioners, not necessarily subject matter
experts.
 Extensive management experience, oversees day-to-day ops.
 Set schedules, assigns prioritization, generates reports.
Findings: Security Work Roles
Findings: Day in Life of a Security Analyst
More
Variables
Increase Working
Memory
Represent
Time
Facilitate
Discovery
Lack of
Expertise
Lack of
Time
14
15
Concept
Phase
Design
Requirements
1. Visualizations should be used a tool
to enhance the typical analyst
workflow by providing high to low-level
visibility and context to granular data.
2. Visualizations should be used as a
tool for collaboration or reporting.
16
Concept Phase
Foundations of Visualizations: Ben Shneiderman’s Information seeking mantra
1. Overview First 2. Zoom and Filter 3. Details on Demand
• Should guide the user them to
other parts of the product for
further exploration.
• The overview should
summarize the overarching
story from the entire data set
without getting into the minor
details.
• Aim to provide the user with
plenty of control for zooming
and filtering data from the
overview
• Extremely important for
complex visualizations (ie.
attack timelines) – The Zoom
and Filter is the driving
mechanism for organization to
your user.
• This third layer of data would be
less visual, and more text-heavy
with a focus on accurate
information rather than trends.
• Bring them as close as possible
to the raw data, and equip them
to find what they started out
looking for.
17
Prototyping: Temporal Structures
Ward Shelley
Addendum of Alfred
Barr Pt 2
“…I like to present narratives with sprawling information-rich
panoramas. Yet these diagrams are radical reductions of written
sources I’ve researched. I have had to choose who what to
include, who and what not. Because the variables I have to work
with are extremely limited, the people and events I use are
reduced to symbols that are plotted in relationships to each
other in the diagrams…”
19
Prototyping: Spatio-Temporal Structures
Existence Changes: Changes in instant events, such as the appearing or disappearing of objects
and/or relationships.
Spatial Changes: Change in spatial properties of objects such as location, size and shape
20
Prototyping: Spatio-Temporal Structures
21
Prototyping: Spatio-Temporal Structures
22
Prototyping: Spatio-Temporal Structures
23
Prototyping: Spatio-Temporal Structures
24
Prototyping: Spatio-Temporal Structures
25
Looking
Forward
The only path is
forward
• Adding workflow enhancements:
Pivoting/Collaboration
• More user testing and refinement – are trying to
poke as many holes as possible
• Scaling past a singular endpoint
Thank You
Contact:
mpark@endgame.com @muted_counts

More Related Content

PPTX
Ask me anything: A Conversational Interface to Augment Information Security w...
PDF
Professional Hacking in 2011
PPTX
Security and Emotion: Sentiment Analysis of Security Discussions on GitHub
PPTX
Cognitive Analysis With SparkSecure
PDF
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
PPTX
Cyber Threat Hunting: Identify and Hunt Down Intruders
PDF
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
PPTX
Infiltrate 2015 - Data Driven Offense
Ask me anything: A Conversational Interface to Augment Information Security w...
Professional Hacking in 2011
Security and Emotion: Sentiment Analysis of Security Discussions on GitHub
Cognitive Analysis With SparkSecure
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
Cyber Threat Hunting: Identify and Hunt Down Intruders
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
Infiltrate 2015 - Data Driven Offense

What's hot (13)

PDF
Enabling effective hunt teaming and incident response
PDF
Fighting advanced malware using machine learning (English)
PPTX
Strata 2015 Presentation -- Detecting Lateral Movement
PDF
Transforming Adversary Emulation Into a Data Analysis Question
PPTX
Threat Hunting 101: Intro to Threat Detection and Incident Response
PDF
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
PDF
Resistance Isn't Futile: A Practical Approach to Threat Modeling
PPTX
Transforming incident Response to Intelligent Response using Graphs
PPTX
Crowd-Sourced Threat Intelligence
PDF
Threat Hunting Report
PPTX
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...
ODP
Negative Unemployment and Great Job Satisfaction? Why infosec is AWESEOME
Enabling effective hunt teaming and incident response
Fighting advanced malware using machine learning (English)
Strata 2015 Presentation -- Detecting Lateral Movement
Transforming Adversary Emulation Into a Data Analysis Question
Threat Hunting 101: Intro to Threat Detection and Incident Response
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Resistance Isn't Futile: A Practical Approach to Threat Modeling
Transforming incident Response to Intelligent Response using Graphs
Crowd-Sourced Threat Intelligence
Threat Hunting Report
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...
Negative Unemployment and Great Job Satisfaction? Why infosec is AWESEOME
Ad

Similar to Data Visualizations in Cyber Security: Still Home of the WOPR? (20)

PDF
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
PDF
Big Data Visualization
PDF
Visualization for Security
PPTX
Dataviz For Cyber Security
PDF
2. Enterprise and Business Architecture Cloud Video Data
PDF
Visualization in the Age of Big Data
PPTX
Delivering Security Insights with Data Analytics and Visualization
PDF
Creating data visualisations that don't suck
PDF
hcid2011 - RED: a multi-disciplinary approach to experience design - Jarnail ...
PDF
DEF CON 27 - workshop - KRISTY WESTPHAL - analysis 101
PDF
PhD and Post PhD Network Security Visualization Research
PDF
Safeguarding Abila through Multiple Data Perspectives
PPTX
Designing Guidelines for Visual Analytics System to Augment Organizational An...
PDF
Data-visualization presentation data visualization data
PDF
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
PPTX
Data Visualization in Big Data Analytics
PDF
2nd Athens Big Data Meetup - 1st Talk - From Data Visualization to Visual Ana...
PDF
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
PDF
A Space X Industry Day Briefing 7 Jul08 Jgm R4
PPTX
How to design for data experiences
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
Big Data Visualization
Visualization for Security
Dataviz For Cyber Security
2. Enterprise and Business Architecture Cloud Video Data
Visualization in the Age of Big Data
Delivering Security Insights with Data Analytics and Visualization
Creating data visualisations that don't suck
hcid2011 - RED: a multi-disciplinary approach to experience design - Jarnail ...
DEF CON 27 - workshop - KRISTY WESTPHAL - analysis 101
PhD and Post PhD Network Security Visualization Research
Safeguarding Abila through Multiple Data Perspectives
Designing Guidelines for Visual Analytics System to Augment Organizational An...
Data-visualization presentation data visualization data
OpenDNS CTO Dan Hubbard VizSec 2014 Keynote Slides
Data Visualization in Big Data Analytics
2nd Athens Big Data Meetup - 1st Talk - From Data Visualization to Visual Ana...
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
A Space X Industry Day Briefing 7 Jul08 Jgm R4
How to design for data experiences
Ad

Recently uploaded (20)

PDF
SEVA- Fashion designing-Presentation.pdf
PPTX
Wisp Textiles: Where Comfort Meets Everyday Style
PPTX
BSCS lesson 3.pptxnbbjbb mnbkjbkbbkbbkjb
PDF
Interior Structure and Construction A1 NGYANQI
PPTX
rapid fire quiz in your house is your india.pptx
PPTX
An introduction to AI in research and reference management
PDF
BRANDBOOK-Presidential Award Scheme-Kenya-2023
PDF
Quality Control Management for RMG, Level- 4, Certificate
PPTX
building Planning Overview for step wise design.pptx
PDF
The Advantages of Working With a Design-Build Studio
PDF
Emailing DDDX-MBCaEiB.pdf DDD_Europe_2022_Intro_to_Context_Mapping_pdf-165590...
PPTX
YV PROFILE PROJECTS PROFILE PRES. DESIGN
PPTX
Special finishes, classification and types, explanation
PPTX
12. Community Pharmacy and How to organize it
PDF
Integrated-2D-and-3D-Animation-Bridging-Dimensions-for-Impactful-Storytelling...
PDF
Design Thinking - Module 1 - Introduction To Design Thinking - Dr. Rohan Dasg...
PPTX
CLASS_11_BUSINESS_STUDIES_PPT_CHAPTER_1_Business_Trade_Commerce.pptx
PDF
UNIT 1 Introduction fnfbbfhfhfbdhdbdto Java.pptx.pdf
PPTX
joggers park landscape assignment bandra
PPTX
6- Architecture design complete (1).pptx
SEVA- Fashion designing-Presentation.pdf
Wisp Textiles: Where Comfort Meets Everyday Style
BSCS lesson 3.pptxnbbjbb mnbkjbkbbkbbkjb
Interior Structure and Construction A1 NGYANQI
rapid fire quiz in your house is your india.pptx
An introduction to AI in research and reference management
BRANDBOOK-Presidential Award Scheme-Kenya-2023
Quality Control Management for RMG, Level- 4, Certificate
building Planning Overview for step wise design.pptx
The Advantages of Working With a Design-Build Studio
Emailing DDDX-MBCaEiB.pdf DDD_Europe_2022_Intro_to_Context_Mapping_pdf-165590...
YV PROFILE PROJECTS PROFILE PRES. DESIGN
Special finishes, classification and types, explanation
12. Community Pharmacy and How to organize it
Integrated-2D-and-3D-Animation-Bridging-Dimensions-for-Impactful-Storytelling...
Design Thinking - Module 1 - Introduction To Design Thinking - Dr. Rohan Dasg...
CLASS_11_BUSINESS_STUDIES_PPT_CHAPTER_1_Business_Trade_Commerce.pptx
UNIT 1 Introduction fnfbbfhfhfbdhdbdto Java.pptx.pdf
joggers park landscape assignment bandra
6- Architecture design complete (1).pptx

Data Visualizations in Cyber Security: Still Home of the WOPR?

  • 1. Data Visualizations in Cyber Security: Still Home of the WOPR? Confidential and Proprietary Bsides Las Vegas 2017 Matthew Park
  • 2. 2 Who Am I? MATTHEW PARK  User Experience Lead  Background in Big Data and Video Games Design  @muted_counts  mpark@endgame.com
  • 4. 4 Home of the WOPR? Hollywood fiction at it’s finest. Learn DAMMIT LEARN
  • 5. 5 The Life of an Actual SOC Analyst 5 /70 Alerts 30 /250 Alerts 150 /8,173 Alerts
  • 6. Raffael Marty Author of Applied Security Visualization “The general problem plaguing security visualizations today…they are either the work of designers with no background in security, or of security professionals who don’t understand data visualizations.”
  • 8. 8 Comfort Zones Example How visualizations can find that needle in the haystack
  • 9. Let’s Talk Attack Timelines How Amazing is WarGames? The General Problems with Visualizations in Security Let’s Talk Attack Timelines Discovery / Recognizing our Biases / User Testing Persona Creation / Design Requirements Concepting / Basics of Design Structures Prototyping / Looking Ahead End of the appetizer, time for the entrée.
  • 10. 10 Three Stages Discovery Confirming/disproving biases, understanding our users, capturing organizational workflows Concept Creating a basic foundation from known design patterns, Creating new design requirements from our users Prototyping and User Testing Feature creation and taking it back into the ‘wild’ for testing User-Centric Design
  • 11. 11 Discovery Phase Definition and Recognizing our Biases Experience Time Differentiation • Lack of security expertise • Lack of platform domain experience • Limited time to review alerts and incidents • Forced to make informed decisions quickly • Forces conformity • Requires level of expertise to extract value
  • 12. 12 User-centric Design Study  GOAL: Capture team dynamics and worker roles within security organization to identify challenges common across security teams User Group Team Type Environment Collection Method A Traditional SOC Individuals Day-to-day use User interviews B Novice Training Team Mock Scenario Side-by-side monitoring, Retrospective & User interviews C Internal Red vs. Blue Mock Scenario Mirrored Scenario as User Group B
  • 13. 13  Have little to no prior experience (average of 1 year) in the cyber security space. First line of defense in a Security Operations Center.  Main responsibility is to initially triage alerts and determine if escalation (to higher tiered) is required.  Primarily rely on a platform’s GUI. Tier 1 Analyst Tier 3 Analyst Forensic Hunter  Intimately understand network and platform architecture.  Seen as domain experts on the SOC team and more comfortable working through the command line.  Investigates escalated alerts, and determine root causes and extent to remediate problems.  Expert in EDR platforms and sophisticated investigation tools  Uses command line and scripting languages to bypass UI and collect large data feeds using 3rd party APIs. SOC Manager  Skilled security practitioners, not necessarily subject matter experts.  Extensive management experience, oversees day-to-day ops.  Set schedules, assigns prioritization, generates reports. Findings: Security Work Roles
  • 14. Findings: Day in Life of a Security Analyst More Variables Increase Working Memory Represent Time Facilitate Discovery Lack of Expertise Lack of Time 14
  • 15. 15 Concept Phase Design Requirements 1. Visualizations should be used a tool to enhance the typical analyst workflow by providing high to low-level visibility and context to granular data. 2. Visualizations should be used as a tool for collaboration or reporting.
  • 16. 16 Concept Phase Foundations of Visualizations: Ben Shneiderman’s Information seeking mantra 1. Overview First 2. Zoom and Filter 3. Details on Demand • Should guide the user them to other parts of the product for further exploration. • The overview should summarize the overarching story from the entire data set without getting into the minor details. • Aim to provide the user with plenty of control for zooming and filtering data from the overview • Extremely important for complex visualizations (ie. attack timelines) – The Zoom and Filter is the driving mechanism for organization to your user. • This third layer of data would be less visual, and more text-heavy with a focus on accurate information rather than trends. • Bring them as close as possible to the raw data, and equip them to find what they started out looking for.
  • 18. Ward Shelley Addendum of Alfred Barr Pt 2 “…I like to present narratives with sprawling information-rich panoramas. Yet these diagrams are radical reductions of written sources I’ve researched. I have had to choose who what to include, who and what not. Because the variables I have to work with are extremely limited, the people and events I use are reduced to symbols that are plotted in relationships to each other in the diagrams…”
  • 19. 19 Prototyping: Spatio-Temporal Structures Existence Changes: Changes in instant events, such as the appearing or disappearing of objects and/or relationships. Spatial Changes: Change in spatial properties of objects such as location, size and shape
  • 25. 25 Looking Forward The only path is forward • Adding workflow enhancements: Pivoting/Collaboration • More user testing and refinement – are trying to poke as many holes as possible • Scaling past a singular endpoint

Editor's Notes

  • #3: My name is Matthew Park. I lead the UX team at Endgame. Endgame is a player in the EPP EDR Space - building endpoint protection for commercial enterprise. What our team does and cares about (The UX Team) is building thoughtful and practical workflows, visualizations, and experiences for the cyber security analysts. If you don’t understand the image to the right - You’re not supposed to, it’s one of my favorite jokes on how people define ux vs ui.
  • #5: So I don’t want too be bold, but this is probably one of the greatest scenes in film history. For those not familiar with the film War Games, the United States built a war simulator called the WOPR, during the latter portion of the cold war, to run possible war simulations - hoping to learn from each scenario for us to have the upper hand in any possible nuclear engagement. Here WOPR can no longer tell the difference between a game and reality as it brute forces it way into NORAD for nuclear launch codes. And the final scene culminates to matthew broderick screaming “Learn DAMMIT LEARN” as he try to get the WOPR to learn of the futility of war through tic-tac-toe. The movie is 50% siren horns and compilation shots of whizzing lights of early 1980 technology, and 50% matthew broderick being a more tech savvy ferris bueller. It's as perfect as 80s movies get. And it's absolutely ridiculous. Now It’s ridiculous... because it seems like the main driving component of these SOC analyst and military general’s decisions were made from these WOPR visualizations. I can count between two fingers the number of times I saw a NORAD analyst with an opened unix shell, instead of the multiple times they are eyes-glued to the visual boards of missile strikes. And although it offends my designer (at least, visual) sensibilities, the map visualizations of the WOPR were minimal, clean, relatively easy to understand, and clearly had the mindset of NORAD analysts in mind. Hollywood fiction at it’s finest. The title of this talk is ‘Data Visualizations in Cyber Security: Still home of the WOPR” - And let’s face it, visualizations today in no way dictate or have the workflow influence that the WOPR ever had. It was never home of the WOPR. Our analysts today instead sift through streams of alerts there list heavy views and Naturally form around that and do not want to be bogged down by time-consuming or useless visualizations.
  • #6: So let’s step back into reality of what a real SOC organization is like: The cyber security space is naturally a very difficult domain to explore and understand. From the Defensive Cyber Operations (DCO) side, there are streams of new exploits types and malicious attacks constantly threatening an array of different network environments. A typical defensive analyst job is to maintain their knowledge of these attacks; they need to know what patterns to look for, what to spot, essentially finding that needle in a haystack - in a very short amount of time. Of course once that needle is found, these security analysts are then tasked to find where other corresponding problematic areas exist; exposing and remediating other areas of the network the attacker could have manipulated. It's a classic ‘cat and mouse’ game that keeps analysts constantly on their toes searching or reacting to malicious events. Naturally, these analysts form habits in searching their network environment and do not want to be bogged down by time-consuming or useless visualizations.
  • #7: But why do security analysts generally regard new types of visualization introduced to them as “useless eye-candy” and disruptive to their workflow. Raffael Marty (author of Applied Security Visualization) - talks about this general problem plaguing security visualizations today. He says “they are either the work of designers with no background in security, or of security professionals who don’t understand data visualizations.” One is beautiful but not practical in getting work done, the other is effective, but clunky to use (non-intuitive) and requires the average analyst to do more work in piecing together stories. Traditionally - basic “out-of-the-box” visualizations fall into this category, as our industry/products currently lean towards the latter as it is easier to build. We tend to lean on familiarity, rather than make a focused effort towards usability.
  • #8: But done right, visualizations can be a powerful tool for an analyst. Lets walk through a quick example: So we generally know analysts are known to be more comfortable (or at least have more experience) sifting through lists/lines of data, whether it’s through an security enterprise platform or command line. But this can be quite time consuming, especially if you don’t know what to look for. And when you’re streaming through lists of event or alert data, it's very tough to spot patterns or recognize changes in a larger scale. These are where our ideals of visualizations should drop in. Image Example: Now, these data sets have the same mean, variance, regression lines, and error rates.
  • #9: However, plotting them as charts makes their unique patterns very obvious. And this is a singular and simple example of how we can expand a greater visibility of data back to our users.
  • #10: Now - While we can talk abstractly around the pitfalls and ideals of visualizations as a whole, the purposes of this talk is primarily based around attack timelines. At the end of this talk I will be discussing and showing a couple concepts we are currently prototyping. But these new designs shouldn’t be the key takeaway from this talk. My hope is as I discuss our approach and processes in concepting our ideal attack timeline visualizations - you all can take some of these key principles back and broaden your perspective how to approach your own set of visualizations (Whether it be your own set of attack timelines or anything else). In order to introduce a new set functional and usable visualizations into the security space (that go beyond familiarity), the people building them need to do research into proper design patterns as well as gain a better understanding of their users.
  • #11: So, with that in mind - let's discuss how we initially approached our problem with attack timelines. It should be no surprise, being someone who lives in the user experience space, we decidedly took a user centric approach to the problem.
  • #12: The goal of an attack timeline or alert triage visualization is to allow an analyst to quickly asses the relative severity of an alert so that they can dismiss, remediate, or escalate to another analyst. They serve as a means to communicate the story of an attack (or supposed attack) and should be used as a platform for data manipulation and exploration. Coming from an organization that has prior experience with these type of tools, we had a couple of biases going into our initial creation: There are large groups of users that lack security and platform domain experience. Making a lot current visualizations difficult to navigate, as they are overly complicated and too expansive - compounded with the fact users do not have the proper training to make an informed decision. Users lack time: These analyst will typically have 5-10min to make a decision on an alert. As illustrated before, the queue of alerted information can be never-ending and can stack up when not dealt with in a timely manner. In order to differentiate ourselves we wanted to provide value to our users particularly around enhancing the analyst's workflow: What are the appropriate pivot points for Response action Gathering more data Launching an investigation Context on actions already taken Collaboration/Commenting
  • #13: Knowing our biases, we wanted to confirm or deny what we knew by capturing user data through different types of user testing and research. By studying our users we used this opportunity to redefine our user roles by creating new personas specifically around alert triage. Describe the user testing groups
  • #14: Describe user groups
  • #15: In general Opening the attack timeline visualization to accommodate a lot of variables – there was a general concern of whether a visualization accurately represent the amount of data returned back on alert. People with prior experience with attack timelines noted they only saw high-level event connection patterns which wasn’t enough Time is an abstract concept and not inherently visual. Timelines either try to force time into a linear perspective or remove it completely. Tier 1 Tier 1 - Convey meaning Tier 1 - Lack of Time Tier 3 Tier 3 for Tier 1s - Increase working memory/Enhance detection and recognition Tier 3 for Tier 3s - Facilitate discovery/search
  • #16: We can divide the purpose of a data visualization into two primary categories: Visualizations should be used a tool to enhance the typical analyst workflow by providing high to low-level visibility and context to granular data. When created purposefully, they shine when mapping large quantities of data at scale and through time. Visualizations should be used as a tool for collaboration or reporting. Clear visual representations of data, do not require you to be (in this case, a security) domain expert. Anyone can understand trends or content distribution. Humans are naturally visual people and process visual data at a faster “at-a-glance” rate - which opens accessibility of content to a larger array of users.
  • #17: With our redefined personas, workflow habits captured, design requirements identified.  We chose to revisit the basic foundations any type of visualizations should follow.  Ben Shneiderman’s (A very distinguished scholar in the field of visualization) information seeking mantra - found that the most powerful visualizations share the same traits: Overview (Dashboard) First.   It’s the first thing a user will see, and should guides them to other parts of the product for further exploration.   It should be carefully planned to highlight the important parts of the story, and give lesser weight to the not-so-critical parts. The Overview creation is a process of constant refining and experimenting. And in that sense, the overview section would benefit most from constant testing and refining to arrive at the perfect dashboard design. Zoom and Filter. Once all the data is presented to the user in the overview section, the user will want to focus on particular areas of interest. From a design perspective, you should aim to provide the user with plenty of control for zooming and filtering data from the overview. This involves zooming and filtering the data using the visualizations interactive features: zooming, scrolling, panning, drill-down, legend, range selector,  (this is VERY IMPORTANT in complex visualizations, zoom and filter functionality should be deigned in a way that doesn’t get your user lost in the visualization) If designed correctly - This will yield maximum insights and action from the information at hand. Details on Demand. You want to give the viewer access to the minutia of details. This would bring them as close as possible to the raw data, and equip them to find what they started looking for. This third layer of data would be less visual, and more text-heavy with a focus on accurate information rather than trends. This way the analyst gets what he or she needs, in a way that drives action. By using the three steps of the information-seeking mantra, you can avoid information overload, analyze data more easily, and find solutions faster.
  • #18: Our next step was finding a structure that could accommodate all the flexibility of all the user data we acquired. These were two examples (OF MANY Ideas) of our first iterations of the timeline – you can see in both examples that they hint at other areas of the network environment while remaining still pulling back that initial timeline snapshot of parent process events. The problem of both of these iterations is that we were confining our data to a very rigid (linear) view – and still constraining time to a single axis. We had the overview section outlined well, but it was difficult to zoom and filter down to the granular level As we were working through our initial ideas – we were receiving more event data back from our sensors that we initially anticipated – other than process, network, user – We were also beginning to show showing changes of events in real time on an event level.
  • #19: “I like to present narratives with sprawling information-rich panoramas. Yet these diagrams are radical reductions of written sources I’ve researched. I have had to choose who what to include, who and what not. Because the variables I have to work with are extremely limited, the people and events I use are reduced to symbols that are plotted in relationships to each other in the diagrams. Even within such limitations, it is possible to tell a compelling story.” Ward Shelley ‘Addendum to Alfred Barr, ver. 2”
  • #20: Used to address the problem of representing the fluidity of time in space – especially in a static form. Traditionally used and represented in multiple ways in different geographies – Historical geography – what happened where in part times. Cultural Geography – Where events happened in time Time Geography – How much time it took for events to happen in space. Quantitiative geography which encompasses spatial diffusion and time series analysis. What occurred where in known periods of time
  • #21: Three.js Types: Andrenko and colleagues - two types of temporal aspects that are crucial when dealing with spatio-temporal data. Temporal primitives and structural organization of temporal dimensions. Primitives: Time points (point in time) or time intervals (extent of time). Structures: Ordered time, branching time, and multiple perspectives. Time points (point in time)– branching time. This view freed up a variable axis, but was poor for comparison. Ordered Time (Most commonly used) - broken into two types. Linear Time or Cyclical Time, Linear time provides a continuous sequence of temporal primitives, from past to future, (timelines) and cyclic time organizes primitives in recurrent finite sets (times of day) Branching time - representing alternative scenarios Multiple Perspectives - representing more than one point of view.
  • #22: time intervals (extent of time)– WE orginally represented in a point in time view – but it was poor for comparisons Branching time - representing alternative scenarios – Multiple Perspectives - representing more than one point of view.
  • #23: Describe Visualization
  • #24: Describe Visualization
  • #26: Describe Visualization