Difference between revisions of "The Defenders: Proposal Version 1"

From Visual Analytics for Business Intelligence
Jump to navigation Jump to search
Line 1: Line 1:
 +
 
{| style="background-color:white; color:white padding: 5px 0 0 0;" width="100%" height=50px cellspacing="0" cellpadding="0" valign="top" border="0" |
 
{| style="background-color:white; color:white padding: 5px 0 0 0;" width="100%" height=50px cellspacing="0" cellpadding="0" valign="top" border="0" |
  
Line 105: Line 106:
 
<br>
 
<br>
 
<div style="background: #FFFFFF; margin-top: 40px; font-weight: bold; line-height: 0.3em;letter-spacing:-0.08em;font-size:20px"><font color="#FF6347" face="Helvetica">KEY TECHNICAL CHALLENGES</font></div>
 
<div style="background: #FFFFFF; margin-top: 40px; font-weight: bold; line-height: 0.3em;letter-spacing:-0.08em;font-size:20px"><font color="#FF6347" face="Helvetica">KEY TECHNICAL CHALLENGES</font></div>
 
+
<br>
 
+
[[File:TechChallenges.png|center|625px]]
 +
<br>
 
<div style="background: #FFFFFF; margin-bottom:10px; margin-top: 40px; font-weight: bold; line-height: 0.3em;letter-spacing:-0.08em;font-size:20px"><font color=#FF7F50 face="Helvetica">PROJECT TIMELINE</font></div>
 
<div style="background: #FFFFFF; margin-bottom:10px; margin-top: 40px; font-weight: bold; line-height: 0.3em;letter-spacing:-0.08em;font-size:20px"><font color=#FF7F50 face="Helvetica">PROJECT TIMELINE</font></div>
 
+
<br>
 
+
[[File:Timeline.png|center|600px]]
 +
<br>
 
<div style="background: #FFFFFF; margin-top: 40px; font-weight: bold; line-height: 0.3em;letter-spacing:-0.08em;font-size:20px"><font color=#FF6347 face="Helvetica">REFERENCES</font></div>
 
<div style="background: #FFFFFF; margin-top: 40px; font-weight: bold; line-height: 0.3em;letter-spacing:-0.08em;font-size:20px"><font color=#FF6347 face="Helvetica">REFERENCES</font></div>
  

Revision as of 02:01, 12 October 2018

Intro Motivation and Objectives.png
SELECTED DATASET
Breach Level Index Header text
Source : Gemalto, the world leader in digital security. Example
Purpose : Dataset is designed to provide a simple way to input publicly disclosed information on data breaches and calculate a score indicating breach severity. (https://breachlevelindex.com/) Example

1. Organization Breached

2. Number of Records Breached

3. Date of Breach:

   01/01/2013 - 29/06/2018

4. Type of Breach

   -Nuisance (Email, Addresses, Affiliation)
   -Account Access (Username, Passwords to websites/ social media)
   -Financial Access (Bank Account Credentials)
   -Identity Theft ( Information can be used to masquerade someone)
   -Existential Data ( Info can be used to threaten business survival)

5. Source of Breach:

   -Lost Device
   -Stolen Device
   -Malicious Insider
   -Malicious Outsider
   -State Espionage

6. Location: Country

7. Industry:

   -Technology, Other, Retail, Government, Healthcare, Education
   -Financial, Social Media, Hospitality, Entertainment, Insurance
   -Non-profit, Industrial, Professional Services

8. Risk Score:

   Log 10 ( Type of Data * Source of Breach * Whether Action was taken)
Example

BACKGROUND SURVEY OF RELATED WORKS
Related Works What We Can Learn


SKETCHES STORYBOARD
Sketches How Analyst Can Conduct Analysis

ARCHITECTURE DIAGRAM



KEY TECHNICAL CHALLENGES


TechChallenges.png


PROJECT TIMELINE


Timeline.png


REFERENCES


COMMENTS

Feel free to comments, suggestions and feedbacks to help us improve our project!:D