{"id":66456,"date":"2022-04-06T22:37:04","date_gmt":"2022-04-06T22:37:04","guid":{"rendered":"https:\/\/www.kriativ-tech.com\/?p=66456"},"modified":"2022-04-06T22:37:04","modified_gmt":"2022-04-06T22:37:04","slug":"relation-of-data-visualization-techniques-with-the-phases-of-cybersecurity-incidents-response-process","status":"publish","type":"post","link":"https:\/\/www.kriativ-tech.com\/?p=66456","title":{"rendered":"Relation of Data Visualization Techniques with the phases of Cybersecurity Incidents Response process"},"content":{"rendered":"<p>[vc_row][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243;]Kriativ-tech Volume 1, Issue 9, April 2018, Pages: xxx Received: Dec. 28, 2019; Accepted: Feb. 25, 2020. Published: Oct. 11, 2021.[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Authors[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243; uncode_shortcode_id=&#8221;949050&#8243;]Ivo Ricardo Dias Rosa,Invited Assistant Professor at ISTEC[\/vc_custom_heading][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_custom_heading]Media[\/vc_custom_heading][vc_button button_color=&#8221;accent&#8221; border_animation=&#8221;btn-ripple-out&#8221; border_width=&#8221;0&#8243; link=&#8221;url:http%3A%2F%2Fwww.kriativ-tech.com%2Fwp-content%2Fuploads%2F2022%2F04%2FArticle_Template_ISTEC_ShortPaper_Relation_of_Data_Visualization-2.pdf|target:_blank&#8221; button_color_type=&#8221;uncode-palette&#8221; uncode_shortcode_id=&#8221;177053&#8243;]PDF[\/vc_button][vc_custom_heading heading_semantic=&#8221;h4&#8243; text_size=&#8221;h4&#8243;]To cite this article[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h6&#8243; uncode_shortcode_id=&#8221;170439&#8243;]Ivo Ricardo Dias Rosa,\u00a0<b>elation of Data Visualization Techniques with the phases of Cybersecurity Incidents Response process<\/b><\/p>\n<p>DOI: 10.31112\/kriativ-tech-2021-10-70[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row row_height_percent=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; gutter_size=&#8221;1&#8243; column_width_percent=&#8221;100&#8243; shift_y=&#8221;0&#8243; z_index=&#8221;0&#8243;][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; override_padding=&#8221;yes&#8221; column_padding=&#8221;1&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Abstract[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243; uncode_shortcode_id=&#8221;101914&#8243;]Globally for nations and organizations (also due to the impositions and response needs imposed by security and privacy regulations) it is increasingly relevant to strengthen the ability of organizations to anticipate and detect possible security events in a timely manner, even when it is not possible to contain the threat it is necessary that incident response teams are able to tell and explain what happened.<br \/>\nThis article provides a review was made concerning Cybersecurity, in particular the importance and relevance of the security incident response process, which may have operational and reputational impacts, and the identification and mapping of the purposes of applying data visualization techniques to give meaning or explain the typical phases of the security incident response process.[\/vc_custom_heading][vc_empty_space empty_h=&#8221;2&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]Keywords[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_size=&#8221;h5&#8243; uncode_shortcode_id=&#8221;266078&#8243;]<i>Cybersecurity, cybersecurity incidents, incident response process, data visualization<\/i>[\/vc_custom_heading][\/vc_column][\/vc_row][vc_row][vc_column column_width_percent=&#8221;100&#8243; gutter_size=&#8221;0&#8243; overlay_alpha=&#8221;50&#8243; shift_x=&#8221;0&#8243; shift_y=&#8221;0&#8243; shift_y_down=&#8221;0&#8243; z_index=&#8221;0&#8243; medium_width=&#8221;0&#8243; mobile_width=&#8221;0&#8243; width=&#8221;1\/1&#8243;][vc_custom_heading heading_semantic=&#8221;h3&#8243; text_size=&#8221;h3&#8243;]References[\/vc_custom_heading][vc_custom_heading heading_semantic=&#8221;p&#8221; text_font=&#8221;font-213936&#8243; text_size=&#8221;h5&#8243; text_height=&#8221;fontheight-843833&#8243; uncode_shortcode_id=&#8221;124143&#8243;]DADOS &#8211; A Nova J\u00f3ia da Coroa. September 04, 2017. Available online: https:\/\/dataprivacy-on.com\/comunicacao\/2017\/11\/9\/dados-a-nova-joia-da-coroa. Accessed on 25-02-2022.<br \/>\nBravo, R. (2020). Seguran\u00e7a da informa\u00e7\u00e3o e Ciberseguran\u00e7a: aspetos pr\u00e1ticos e legisla\u00e7\u00e3o. Seguran\u00e7a Da Informa\u00e7\u00e3o e Ciberseguran\u00e7a: Aspetos Pr\u00e1ticos e Legisla\u00e7\u00e3o.<br \/>\nDiakun-Thibault, Nadia. (2014). Defining Cybersecurity. Technology Innovation Management Review. 2014.<br \/>\nISO\/IEC 27001 &#8211; INFORMATION SECURITY MANAGEMEN. Available online: https:\/\/www.iso.org\/isoiec-27001-information-security.html. Accessed on 25-02-2022<br \/>\nISO\/IEC 27701:2019 Security techniques \u2014 Extension to ISO\/IEC 27001 and ISO\/IEC 27002 for privacy information management \u2014 Requirements and guidelines. Available online: https:\/\/www.iso.org\/standard\/71670.html. Accessed on 25-02-2022<br \/>\nWorld Economic Forum. The Global Risks Report 2021 16th Edition &#8211; INSIGHT REPORT. In partnership with Marsh McLennan, SK Group and Zurich Insurance Group published by the World Economic Forum. 2021. Available online: http:\/\/www3.weforum.org\/docs\/WEF_The_Global_Risks_Report_2021.pdf. Accessed on 12-03-2022<br \/>\nWorld Economic Forum. The Global Risks Report 2022 17th Edition &#8211; INSIGHT REPORT. In partnership with Marsh McLennan, SK Group and Zurich Insurance Group published by the World Economic Forum. 2022. Available online: http:\/\/www3.weforum.org\/docs\/WEF_The_Global_Risks_Report_2022.pdf. Accessed on 12-03-2022<br \/>\nIncident Response Steps and Frameworks for SANS and NIST. 3 de Janeiro de 2020. Available online: https:\/\/cybersecurity.att.com\/blogs\/security-essentials\/incident-response-steps-comparison-guide. Accessed on 10-03-2022<br \/>\nENISA. 2018. \u201cReference Incident Classification Taxonomy Task Force Status and Way Forward.\u201d European Union Agency For Network and Information Security.<br \/>\nMarty, R. (2008). Applied Security Visualization. Addison Wesley Professional Indianapolis, Indiana, ISBN-10:0-321-51010-0.<br \/>\nRicardo, Andr\u00e9 &amp; Gr\u00e9gio, Andr\u00e9 &amp; Pereira, Ben\u00edcio &amp; Filho, Carvalho &amp; Montes, Antonio &amp; Santos, Rafael. (2009). Cap\u00edtulo 5 T\u00e9cnicas de Visualiza\u00e7\u00e3o de Dados aplicadas \u00e0 Seguran\u00e7a da Informa\u00e7\u00e3o. Available online: https:\/\/www.researchgate.net\/publication\/268397430_Capitulo_5_Tecnicas_de_Visualizacao_de_Dados_aplicadas_a_Seguranca_da_Informacao. Accessed on 10-03-2022<br \/>\nTufte, Edward R.. The Visual Display of Quantitative Information. Graphic Press, 2nd edition, 2001.<br \/>\nData visualization techniques for cyber security analysts \u2014 Guest Blog by Cambridge Intelligence. Department for International Trade The Netherlands. February 13, 2020. Available online: https:\/\/medium.com\/cfs2020\/data-visualization-techniques-for-cyber-security-analysts-guest-blog-by-cambridge-intelligence-1b3d8ddbfc56. Accessed on 12-03-2022.[\/vc_custom_heading][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ivo Ricardo Dias Rosa, Invited Assistant Professor at ISTEC<br \/>\nDOI: 10.31112\/kriativ-tech-2021-10-70<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[70],"tags":[],"_links":{"self":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66456"}],"collection":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=66456"}],"version-history":[{"count":1,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66456\/revisions"}],"predecessor-version":[{"id":66458,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=\/wp\/v2\/posts\/66456\/revisions\/66458"}],"wp:attachment":[{"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=66456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=66456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kriativ-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=66456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}