Computing and Library Services - delivering an inspiring information environment

Managing threats by the use of visualisation techniques

Viduto, Valentina, Maple, Carsten and Huang, Wei (2011) Managing threats by the use of visualisation techniques. International Journal of Space-Based and Situated Computing, 1 (2/3). pp. 204-212. ISSN 2044-4893

[img] PDF - Published Version
Restricted to Repository staff only

Download (76kB)


Identification of threats in networked systems is one of the important risk management processes that should be followed in order to be aware of all risks. In general, risk assessment guidelines for threat analysis propose to use historical organisation's data, thus, novel and unheard threats often are skipped from an analysis. In this paper, we propose a novel onion skin model (OSM) which consists of visualisation techniques, such as attack graphs, often applied for qualitative and quantitative risk assessment analyses. The model can be used to facilitate in threat identification and decision-making process by focusing on attack scenarios that illustrate vulnerable nodes, threats and shortest attack paths to the attacker's goal. The model can be used as part of risk management practices to improve security awareness through different attack scenarios and manage all system risks.

Item Type: Article
Subjects: T Technology > T Technology (General)
Schools: School of Computing and Engineering > Institute of Railway Research
School of Computing and Engineering
Related URLs:
Depositing User: Valentina Viduto
Date Deposited: 18 Dec 2014 12:52
Last Modified: 28 Aug 2021 11:45


Downloads per month over past year

Repository Staff Only: item control page

View Item View Item

University of Huddersfield, Queensgate, Huddersfield, HD1 3DH Copyright and Disclaimer All rights reserved ©