J 2021

Conceptual Model of Visual Analytics for Hands-on Cybersecurity Training

OŠLEJŠEK, Radek, Vít RUSŇÁK, Karolína DOČKALOVÁ BURSKÁ, Valdemar ŠVÁBENSKÝ, Jan VYKOPAL et. al.

Basic information

Original name

Conceptual Model of Visual Analytics for Hands-on Cybersecurity Training

Authors

OŠLEJŠEK, Radek (203 Czech Republic, guarantor, belonging to the institution), Vít RUSŇÁK (203 Czech Republic, belonging to the institution), Karolína DOČKALOVÁ BURSKÁ (203 Czech Republic, belonging to the institution), Valdemar ŠVÁBENSKÝ (703 Slovakia, belonging to the institution), Jan VYKOPAL (203 Czech Republic, belonging to the institution) and Jakub ČEGAN (203 Czech Republic, belonging to the institution)

Edition

IEEE Transactions on Visualization and Computer Graphics, 2021, 1077-2626

Other information

Language

English

Type of outcome

Article in a journal

Field of Study

10201 Computer sciences, information science, bioinformatics

Country of publisher

United States of America

Confidentiality degree

is not subject to a state or trade secret

References:

Impact factor

Impact factor: 5.226

RIV identification code

RIV/00216224:14330/21:00120584

Organization unit

Faculty of Informatics

UT WoS

000668831500006

Keywords in English

Visual analytics; cybersecurity; hands-on training; classification; education

Tags

Tags

International impact, Reviewed
Changed: 23/1/2022 09:41, RNDr. Valdemar Švábenský, Ph.D.

Abstract

V originále

Hands-on training is an effective way to practice theoretical cybersecurity concepts and increase participants’ skills. In this paper, we discuss the application of visual analytics principles to the design, execution, and evaluation of training sessions. We propose a conceptual model employing visual analytics that supports the sensemaking activities of users involved in various phases of the training life cycle. The model emerged from our long-term experience in designing and organizing diverse hands-on cybersecurity training sessions. It provides a classification of visualizations and can be used as a framework for developing novel visualization tools supporting phases of the training life-cycle. We demonstrate the model application on examples covering two types of cybersecurity training programs.

Links

EF16_019/0000822, research and development project
Name: Centrum excelence pro kyberkriminalitu, kyberbezpečnost a ochranu kritických informačních infrastruktur
MUNI/A/1076/2019, interní kód MU
Name: Zapojení studentů Fakulty informatiky do mezinárodní vědecké komunity 20 (Acronym: SKOMU)
Investor: Masaryk University, Category A
MUNI/A/1411/2019, interní kód MU
Name: Aplikovaný výzkum: softwarové architektury kritických infrastruktur, bezpečnost počítačových systémů, zpracování přirozeného jazyka a jazykové inženýrství, vizualizaci velkých dat a rozšířená realita.
Investor: Masaryk University, Category A
MUNI/A/1549/2020, interní kód MU
Name: Zapojení studentů Fakulty informatiky do mezinárodní vědecké komunity 21 (Acronym: SKOMU)
Investor: Masaryk University

Files attached