Chapter 7

Visualizing cybersecurity data

Abstract

Cybersecurity has a history of not doing visualizations well. This chapter discusses the goals of a good visualization and how to create a visualization that will best satisfy the predetermined goals. Visualizations directly related to cybersecurity data are discussed and illustrated. Examples of both good and bad illustrations are given and a thorough discussion of the efficacy of the visualizations is considered.

Keywords

Visualization; Data aggregation; Visualization with a purpose

“A picture is worth a thousand words.” We know that an image can convey a complex thought more effectively than words. Similarly, if we have collected a set of data, a picture used to illustrate it can be more ...

Get Cybersecurity and Applied Mathematics now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.