Difference between revisions of "The Defenders: Proposal Version 1"

From Visual Analytics for Business Intelligence
Jump to navigation Jump to search
Line 17: Line 17:
 
<div style="background: #FFFFFF; margin-top: 40px; font-weight: bold; line-height: 0.3em;letter-spacing:-0.08em;font-size:20px"><font color=#FF6347 face="Helvetica">SELECTED DATASET</font></div>
 
<div style="background: #FFFFFF; margin-top: 40px; font-weight: bold; line-height: 0.3em;letter-spacing:-0.08em;font-size:20px"><font color=#FF6347 face="Helvetica">SELECTED DATASET</font></div>
  
{| class="wikitable" style="background-color:#FFFFFF;" width="100%"
+
{| class="wikitable"
! Dataset/Source
 
! Data Attributes
 
 
|-
 
|-
| style="text-align: center;" |  
+
! Breach Level Index !! Header text
 
+
|-
|
+
| Source : Gemalto, the world leader in digital security. || Example
 
 
 
|-
 
|-
| style="text-align: center;" |  
+
| Purpose : Dataset is designed to provide a simple way to input publicly disclosed information on data breaches and calculate a score indicating breach severity. (https://breachlevelindex.com/) || Example
 
 
|
 
 
 
 
|-
 
|-
| style="text-align: center;" |
+
|  
 +
1. Organization Breached
  
|
+
2. Number of Records Breached
  
|-
+
3. Date of Breach:
| style="text-align: center;" |
+
    01/01/2013 - 29/06/2018
  
|
+
4. Type of Breach
 +
    -Nuisance (Email, Addresses, Affiliation)
 +
    -Account Access (Username, Passwords to websites/ social media)
 +
    -Financial Access (Bank Account Credentials)
 +
    -Identity Theft ( Information can be used to masquerade someone)
 +
    -Existential Data ( Info can be used to threaten business survival)
  
|-
+
5. Source of Breach:
| style="text-align: center;" |
+
    -Lost Device
 +
    -Stolen Device
 +
    -Malicious Insider
 +
    -Malicious Outsider
 +
    -State Espionage
  
|
+
6. Location: Country
  
|-
+
7. Industry:
| style="text-align: center;" |
+
    -Technology, Other, Retail, Government, Healthcare, Education
 +
    -Financial, Social Media, Hospitality, Entertainment, Insurance
 +
    -Non-profit, Industrial, Professional Services
  
|
+
8. Risk Score:
 +
    Log 10 ( Type of Data * Source of Breach * Whether Action was taken)
  
 +
|| Example
 
|}
 
|}
<div style="background: #FFFFFF; margin-top: 40px; font-weight: bold; line-height: 0.3em;letter-spacing:-0.08em;font-size:20px"><font color=#FF6347 face="Helvetica">DATA MODEL</font></div>
 
  
 
<p>
 
<p>

Revision as of 16:33, 11 October 2018

Intro Motivation and Objectives.png
SELECTED DATASET
Breach Level Index Header text
Source : Gemalto, the world leader in digital security. Example
Purpose : Dataset is designed to provide a simple way to input publicly disclosed information on data breaches and calculate a score indicating breach severity. (https://breachlevelindex.com/) Example

1. Organization Breached

2. Number of Records Breached

3. Date of Breach:

   01/01/2013 - 29/06/2018

4. Type of Breach

   -Nuisance (Email, Addresses, Affiliation)
   -Account Access (Username, Passwords to websites/ social media)
   -Financial Access (Bank Account Credentials)
   -Identity Theft ( Information can be used to masquerade someone)
   -Existential Data ( Info can be used to threaten business survival)

5. Source of Breach:

   -Lost Device
   -Stolen Device
   -Malicious Insider
   -Malicious Outsider
   -State Espionage

6. Location: Country

7. Industry:

   -Technology, Other, Retail, Government, Healthcare, Education
   -Financial, Social Media, Hospitality, Entertainment, Insurance
   -Non-profit, Industrial, Professional Services

8. Risk Score:

   Log 10 ( Type of Data * Source of Breach * Whether Action was taken)
Example

BACKGROUND SURVEY OF RELATED WORKS
Related Works What We Can Learn


SKETCHES STORYBOARD
Sketches How Analyst Can Conduct Analysis

ARCHITECTURE DIAGRAM



KEY TECHNICAL CHALLENGES


PROJECT TIMELINE


REFERENCES


COMMENTS

Feel free to comments, suggestions and feedbacks to help us improve our project!:D