Chapter 7

Visualizing cybersecurity data


Cybersecurity has a history of not doing visualizations well. This chapter discusses the goals of a good visualization and how to create a visualization that will best satisfy the predetermined goals. Visualizations directly related to cybersecurity data are discussed and illustrated. Examples of both good and bad illustrations are given and a thorough discussion of the efficacy of the visualizations is considered.


Visualization; Data aggregation; Visualization with a purpose

“A picture is worth a thousand words.” We know that an image can convey a complex thought more effectively than words. Similarly, if we have collected a set of data, a picture used to illustrate it can be more ...

Get Cybersecurity and Applied Mathematics now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.