Télécommunications

Graph Visualization for Cybersecurity

Interested in learning more about #CyberThreatIntelligence? Visit our website: https://cambridge-intelligence.com/use-cases/cybersecurity/

As cyber crime diversifies and the complexity of our data grows, it gets harder to investigate attacks and protect our assets.

In under 15 minutes, #DataVisualization expert Corey Lanum explains how advanced graph technology is one of the most valuable #CyberSecurityTools available to analysts.

He looks at the challenges of huge data sets, and demonstrates techniques you can use with our toolkits to investigate the scope of a cyber attack. #GraphVisualization is a powerful way to understand and protect the structure of your connected assets, and KronoGraph, our timeline visualization toolkit, allows you to identify and examine clusters of unauthorized activity.

There’s also a focus on investigations: it’s important to work out what happened so that you can take steps to prevent future offenders from using the same exploit. As an example you’ll see a data breach demonstration visualized in KeyLines.

Finally, you’ll see how animation can bring the story to life, showing how your network evolves over time, and tracking key events as they unfold.

00:26 What is cybersecurity?
01:26 Building a graph from cyber threat data
02:28 The challenges of huge data sets
02:56 Demo: « Expand and explore »
05:34 Demo: Filtering your data
06:37 Detecting and investigating an attack
07:54 A graph and timeline representation of your data
10:15 Demo: Investigating a data breach
12:05 Animation brings the story to life
12:39 Try our toolkits!

Views : 30
cyber security

Source by Cambridge Intelligence

Mourad ELGORMA

Fondateur de summarynetworks, passionné des nouvelles technologies et des métiers de Réseautique , Master en réseaux et système de télécommunications. ,j’ai affaire à Pascal, Delphi, Java, MATLAB, php …Connaissance du protocole TCP / IP, des applications Ethernet, des WLAN …Planification, installation et dépannage de problèmes de réseau informatique……Installez, configurez et dépannez les périphériques Cisco IOS. Surveillez les performances du réseau et isolez les défaillances du réseau. VLANs, protocoles de routage (RIPv2, EIGRP, OSPF.)…..Manipuler des systèmes embarqués (matériel et logiciel ex: Beaglebone Black)…Linux (Ubuntu, kali, serveur Mandriva Fedora, …). Microsoft (Windows, Windows Server 2003). ……Paquet tracer, GNS3, VMware Workstation, Virtual Box, Filezilla (client / serveur), EasyPhp, serveur Wamp,Le système de gestion WORDPRESS………Installation des caméras de surveillance ( technologie hikvision DVR………..). ,

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *