Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.


Ivo Ricardo Dias Rosa,Invited Assistant Professor at ISTEC



To cite this article

Ivo Ricardo Dias Rosa, elation of Data Visualization Techniques with the phases of Cybersecurity Incidents Response processDOI: 10.31112/kriativ-tech-2021-10-70


Globally for nations and organizations (also due to the impositions and response needs imposed by security and privacy regulations) it is increasingly relevant to strengthen the ability of organizations to anticipate and detect possible security events in a timely manner, even when it is not possible to contain the threat it is necessary that incident response teams are able to tell and explain what happened.This article provides a review was made concerning Cybersecurity, in particular the importance and relevance of the security incident response process, which may have operational and reputational impacts, and the identification and mapping of the purposes of applying data visualization techniques to give meaning or explain the typical phases of the security incident response process.


Cybersecurity, cybersecurity incidents, incident response process, data visualization


DADOS - A Nova Jóia da Coroa. September 04, 2017. Available online: Accessed on 25-02-2022.Bravo, R. (2020). Segurança da informação e Cibersegurança: aspetos práticos e legislação. Segurança Da Informação e Cibersegurança: Aspetos Práticos e Legislação.Diakun-Thibault, Nadia. (2014). Defining Cybersecurity. Technology Innovation Management Review. 2014.ISO/IEC 27001 - INFORMATION SECURITY MANAGEMEN. Available online: Accessed on 25-02-2022ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines. Available online: Accessed on 25-02-2022World Economic Forum. The Global Risks Report 2021 16th Edition - INSIGHT REPORT. In partnership with Marsh McLennan, SK Group and Zurich Insurance Group published by the World Economic Forum. 2021. Available online: Accessed on 12-03-2022World Economic Forum. The Global Risks Report 2022 17th Edition - INSIGHT REPORT. In partnership with Marsh McLennan, SK Group and Zurich Insurance Group published by the World Economic Forum. 2022. Available online: Accessed on 12-03-2022Incident Response Steps and Frameworks for SANS and NIST. 3 de Janeiro de 2020. Available online: Accessed on 10-03-2022ENISA. 2018. “Reference Incident Classification Taxonomy Task Force Status and Way Forward.” European Union Agency For Network and Information Security.Marty, R. (2008). Applied Security Visualization. Addison Wesley Professional Indianapolis, Indiana, ISBN-10:0-321-51010-0.Ricardo, André & Grégio, André & Pereira, Benício & Filho, Carvalho & Montes, Antonio & Santos, Rafael. (2009). Capítulo 5 Técnicas de Visualização de Dados aplicadas à Segurança da Informação. Available online: Accessed on 10-03-2022Tufte, Edward R.. The Visual Display of Quantitative Information. Graphic Press, 2nd edition, 2001.Data visualization techniques for cyber security analysts — Guest Blog by Cambridge Intelligence. Department for International Trade The Netherlands. February 13, 2020. Available online: Accessed on 12-03-2022.