Chapter Download

Visual Security Analysis -- 'Applied Security Visualization,' Chapter 5

Applied Security Visualization

Visual Security Analysis, Chapter 5 of Applied Security Visualization , shows different ways of analyzing security data using visual approaches.

Visually analyzing security data can be separated into three classes: reporting, historical analysis, and real-time monitoring. In this chapter, historical analysis is discussed in four sections: time-series visualization, correlation graphs, interactive analysis and forensic analysis.

 To read the full chapter, download Visual Security Analysis in PDF format.

About the book: In Applied Security Visualization, leading network security visualization expert Raffael Marty introduces all the concepts, techniques, and tools you need to use visualization on your network. You'll learn how to identify and utilize the right data sources, then transform your data into visuals that reveal what you really need to know. Next, Marty shows how to use visualization to perform broad network security analyses, assess specific threats, and even improve business compliance.

 To read a sample book chapter, download Chapter 5 of Applied Security Visualization.

About the author:
As chief security strategist and senior product manager, Raffy is customer advocate and guardian - expert on all things security and log analysis at Splunk. With customers, he uses his skills in data visualization, log management, intrusion detection, and compliance to solve problems and create solutions. Inside Splunk, he is the conduit for customer issues, new ideas and market requirements to the development team. Fully immersed in industry initiatives, standards efforts and activities, Raffy lives and breathes security and visualization. His passion for visualization is evident in the many presentations he gives at conferences around the world.

Excerpted from Applied Security Visualization by Raffael Marty (ISBN: 0321510100).

Copyright © 2008,  Addison-Wesley Professional. All rights reserved.

This was first published in August 2008

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: