SlideShare una empresa de Scribd logo
1 de 42
Computational Cybersecurity in
Compromised Environments (C3E )
Jan 14, 2014

Computer
Human
Interaction:
Mobility
Privacy
Security

©2009 Carnegie Mellon University : 1

Making Sense of
Navigating Cyberspace

Jason Hong
•

Bandwidth

Time

©2014 Carnegie Mellon University : 2

Computing Trends
Bandwidth

•

Storage

•

Time

©2014 Carnegie Mellon University : 3

Computing Trends
Bandwidth

•

Storage

•

Computing Power

•

Time

©2014 Carnegie Mellon University : 4

Computing Trends
Bandwidth

•

Storage

•

Computing Power

•

Information

•

Time

©2014 Carnegie Mellon University : 5

Computing Trends
©2014 Carnegie Mellon University : 6
Cognitive Processing

•

Time

©2014 Carnegie Mellon University : 7

Human Capabilities
Cognitive Processing

•

Visual acuity

•

Time

©2014 Carnegie Mellon University : 8

Human Capabilities
Cognitive Processing

•

Visual acuity

•

Human bandwidth
…
•

Time

©2014 Carnegie Mellon University : 9

Human Capabilities
7
2
©2014 Carnegie Mellon University : 10
Evidence suggests it’s more like 4
©2014 Carnegie Mellon University : 11
©2014 Carnegie Mellon University : 12
1. Start out going Southwest on ELLSWORTH AVE
Towards BROADWAY by turning right.
2: Turn RIGHT onto BROADWAY.
3. Turn RIGHT onto QUINCY ST.
4. Turn LEFT onto CAMBRIDGE ST.
5. Turn SLIGHT RIGHT onto MASSACHUSETTS AVE.
6. Turn RIGHT onto RUSSELL ST.

©2014 Carnegie Mellon University : 13

The Power of Visualization
©2014 Carnegie Mellon University : 14
©2014 Carnegie Mellon University : 15

The Power of Visualization
1. Aesthetics and color really matter
2. Study what people are trying to do
3. InfoViz is also what you don’t show

©2014 Carnegie Mellon University : 16

Some Lessons
©2014 Carnegie Mellon University : 17

US Election 2004
©2014 Carnegie Mellon University : 18

InfoViz’s Can Show and Hide
Info
©2014 Carnegie Mellon University : 19

All Viz’s Show and Hide Info
©2014 Carnegie Mellon University : 20

InfoViz’s Can Show and Hide
Info
©2014 Carnegie Mellon University : 21

All Viz’s Show and Hide Info
1.
2.
3.
4.

Aesthetics and color really matter
Study what people are trying to do
Infoviz is also what you don’t show
All visualizations have inherent biases

©2014 Carnegie Mellon University : 22

Some Lessons
©2014 Carnegie Mellon University : 23

London Underground Map 1990s
©2014 Carnegie Mellon University : 24

Visualization of DNA

by Ben Fry
©2014 Carnegie Mellon University : 25

Visualization of the Internet
©2014 Carnegie Mellon University : 26

Earlier Conceptions of the Net
©2014 Carnegie Mellon University : 27
1.
2.
3.
4.
5.

Aesthetics and color really matter
Study what people are trying to do
Infoviz is also what you don’t show
All visualizations have inherent biases
May not have natural representations,
but can have good conceptual models

©2014 Carnegie Mellon University : 28

Some Lessons
Example from Jeff Heer

©2014 Carnegie Mellon University : 29
©2014 Carnegie Mellon University : 30
©2014 Carnegie Mellon University : 31
Work by Jeff Heer
©2014 Carnegie Mellon University : 32
©2014 Carnegie Mellon University : 33

About 85 per cent of my
"thinking" time was spent
getting into a position to
think, to make a decision…
Much more time went into
finding or obtaining
information than into
digesting it… When the
graphs were finished, the
relations were obvious at
once, but the plotting had to
be done in order to make
them so.
- J.C.R. Licklider, 1960
©2014 Carnegie Mellon University : 34
1.
2.
3.
4.
5.

Aesthetics and color really matter
Study what people are trying to do
Infoviz is also what you don’t show
All visualizations have inherent biases
May not have natural representations,
but can have good conceptual models
6. Viz just one part of toolchain

©2014 Carnegie Mellon University : 35

Some Lessons
• Many Eyes (by IBM)

©2014 Carnegie Mellon University : 36

Collaborative Analysis?
©2014 Carnegie Mellon University : 37
©2014 Carnegie Mellon University : 38
• Pay Mturkers to
help find potential
problems with
smartphone apps

©2014 Carnegie Mellon University : 39

CrowdScanner

95% users were surprised this app
sent their approximate location
to mobile ads providers.

95% users were surprised this app
sent their phone’s unique ID to
mobile ads providers.
90% users were surprised this app
sent their precise location to
mobile ads providers.
0% users were surprised this app
can control camera flashlight.
User can specify exemplars of a group
Belief Propagation to find more nodes

©2014 Carnegie Mellon University : 40

Combine Data Mining + Viz
• Mixed-initiative: Human + Machine

I feel like I have a
“partnership with the machine”
• Builds a highly personalized landscape
(unlike automatic methods)

©2014 Carnegie Mellon University : 41

Apolo’s Key Contributions
• Considering visualizations
1.
2.
3.
4.
5.

Aesthetics and color really matter
Study what people are trying to do
Infoviz is also what you don’t show
All visualizations have inherent biases
May not have natural representations,
but can have good conceptual models
6. Viz just one part of toolchain

• Ongoing research
– Collaborative analysis
– Machine learning + infoviz

©2014 Carnegie Mellon University : 42

Summary

Más contenido relacionado

Similar a Computational Cybersecurity in Compromised Environments (C3E

How to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone AppsHow to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone AppsJason Hong
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Jason Hong
 
Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014
Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014
Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014Jason Hong
 
Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Introduction to User Experience and User Interface Design: A One-Hour Crash C...Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Introduction to User Experience and User Interface Design: A One-Hour Crash C...Jason Hong
 
How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps Jason Hong
 
HCI and Smartphone Data at Scale
HCI and Smartphone Data at ScaleHCI and Smartphone Data at Scale
HCI and Smartphone Data at ScaleJason Hong
 
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Jason Hong
 
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011Location Privacy for Mobile Computing, Cylab Talk on Feb 2011
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011Jason Hong
 
Hyve presentation at InnoCos Europe conference in Paris, June 2011
Hyve presentation at InnoCos Europe conference in Paris, June 2011Hyve presentation at InnoCos Europe conference in Paris, June 2011
Hyve presentation at InnoCos Europe conference in Paris, June 2011KGS Global
 
Queuing and The Age of Context: Release 1 The Digital Consumer Collaborative
Queuing and The Age of Context: Release 1 The Digital Consumer CollaborativeQueuing and The Age of Context: Release 1 The Digital Consumer Collaborative
Queuing and The Age of Context: Release 1 The Digital Consumer CollaborativeDave Norton
 
Designing the User Experience for Online Privacy, at IAPP Navigate 2013
Designing the User Experience for Online Privacy, at IAPP Navigate 2013Designing the User Experience for Online Privacy, at IAPP Navigate 2013
Designing the User Experience for Online Privacy, at IAPP Navigate 2013Jason Hong
 
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Jason Hong
 
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016Jason Hong
 
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Jason Hong
 
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015Jason Hong
 
Using AI to Model Quality Attribute Tradeoffs
Using AI to Model Quality Attribute TradeoffsUsing AI to Model Quality Attribute Tradeoffs
Using AI to Model Quality Attribute TradeoffsNeil Ernst
 
Co-designing Infographics: The case of the RiotID Eucational Material Project
Co-designing Infographics: The case of the RiotID Eucational Material Project Co-designing Infographics: The case of the RiotID Eucational Material Project
Co-designing Infographics: The case of the RiotID Eucational Material Project Isabella Rega
 
CHI 2014
CHI 2014CHI 2014
CHI 2014Nurun
 
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Jason Hong
 

Similar a Computational Cybersecurity in Compromised Environments (C3E (20)

How to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone AppsHow to Analyze the Privacy of 1 Million Smartphone Apps
How to Analyze the Privacy of 1 Million Smartphone Apps
 
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
Making Sense of Cyberspace, keynote for Software Engineering Institute Cyber ...
 
Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014
Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014
Privacy, Ethics, and Big (Smartphone) Data, at Mobisys 2014
 
Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Introduction to User Experience and User Interface Design: A One-Hour Crash C...Introduction to User Experience and User Interface Design: A One-Hour Crash C...
Introduction to User Experience and User Interface Design: A One-Hour Crash C...
 
How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps How to Analyze the Privacy of 750000 Smartphone Apps
How to Analyze the Privacy of 750000 Smartphone Apps
 
HCI and Smartphone Data at Scale
HCI and Smartphone Data at ScaleHCI and Smartphone Data at Scale
HCI and Smartphone Data at Scale
 
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
Social Cybersecurity: Applying Social Psychology to Cybersecurity, at SecHuma...
 
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011Location Privacy for Mobile Computing, Cylab Talk on Feb 2011
Location Privacy for Mobile Computing, Cylab Talk on Feb 2011
 
Hyve presentation at InnoCos Europe conference in Paris, June 2011
Hyve presentation at InnoCos Europe conference in Paris, June 2011Hyve presentation at InnoCos Europe conference in Paris, June 2011
Hyve presentation at InnoCos Europe conference in Paris, June 2011
 
Queuing and The Age of Context: Release 1 The Digital Consumer Collaborative
Queuing and The Age of Context: Release 1 The Digital Consumer CollaborativeQueuing and The Age of Context: Release 1 The Digital Consumer Collaborative
Queuing and The Age of Context: Release 1 The Digital Consumer Collaborative
 
Designing the User Experience for Online Privacy, at IAPP Navigate 2013
Designing the User Experience for Online Privacy, at IAPP Navigate 2013Designing the User Experience for Online Privacy, at IAPP Navigate 2013
Designing the User Experience for Online Privacy, at IAPP Navigate 2013
 
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
Leveraging Human Factors for Effective Security Training, for ISSA 2013 CISO ...
 
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
Privacy, Ethics, and Big (Smartphone) Data, Keynote talk at ICISSP 2016
 
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
Leveraging Human Factors for Effective Security Training, at FISSEA Mar2012
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
 
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
PrivacyGrade and Social Cybersecurity, talk at FTC July 2015
 
Using AI to Model Quality Attribute Tradeoffs
Using AI to Model Quality Attribute TradeoffsUsing AI to Model Quality Attribute Tradeoffs
Using AI to Model Quality Attribute Tradeoffs
 
Co-designing Infographics: The case of the RiotID Eucational Material Project
Co-designing Infographics: The case of the RiotID Eucational Material Project Co-designing Infographics: The case of the RiotID Eucational Material Project
Co-designing Infographics: The case of the RiotID Eucational Material Project
 
CHI 2014
CHI 2014CHI 2014
CHI 2014
 
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
Computer Human Interaction: Mobility, Privacy, and Security, for Cylab Partne...
 

Último

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Último (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Computational Cybersecurity in Compromised Environments (C3E

Notas del editor

  1. This was a 15 minute talk at the C3E workshop on navigating cyberspace. I give a brief overview of what works and what doesn’t for visualization. I also talk a bit at the end about ways of scaling things up (in particular, collaboration, crowdsourcing, and machine learning). Some slides in this talk borrowed from Chris Harrison and Jeff Heer
  2. Qmeeinfographic on amount of information
  3. Yeah, we’re more like this
  4. Wonderful book, with a wonderful title that really summarizes the essence of infoviz: using vision to think
  5. Here’s an example of infoviz. Can have text instructions. Can also have a map. Note that this map is good in that it shows relationships, distances, etc. However, this map also has a lot of clutter, in terms of too many unimportant streets, text running into each other, and color makes it hard to differentiate between what’s important and what’s not.
  6. Compare to Google Maps, they de-emphasize certain roads, emphasize others more, and are better at layout of text labels.
  7. Another case study. If you squint, entire map looks red.
  8. Compare to this one, shows that America is actually more purple than red. Same data, different representation.
  9. Divide things up by county. Can immediately see missing data, as well as distribution of who votes for whom.
  10. Distortion view, shows state sizes based on electoral votes.
  11. This is by population size, can see that major population areas tend to vote blue.
  12. All visualizations have biases. Need fast alternatives to help understand things (so you don’t fool yourself), and you need to realize this when dealing with data.
  13. One of the most beautiful visualizations. Note that it’s roughly geographic, but also relational, showing stops relative to each other. Note that the river Thames does not turn at 90 degrees, and it doesn’t show exact distances. The task of a person in the Tube is not about distances, but just relative distances and relative spaces.
  14. Some data sets don’t have a natural visualization though. This is an art piece by Ben Fry of processing fame, and while it’s very cool, note that it doesn’t really use “vision to think”, things don’t pop out here.
  15. And if there’s too much data, sometimes all you get is a big fat blob
  16. This notion of navigating cyberspace probably won’t be successful, because it doesn’t have the same characteristics of a space that we normally think of
  17. But just because there might not be a good natural metaphor doesn’t preclude us from trying to build good conceptual models. If you physically open a computer, you won’t find icons, folders, windows, etc, but it’s still a fantastic conceptual model for helping us make use of the power of a computer. (Despite the fact that it’s 40 years old)
  18. Slide from Jeff Heer
  19. Slide from Jeff Heer
  20. Slide from Jeff HeerData is messy (missing in this case), a common problem
  21. Slide also from Jeff HeerAlso see Licklider’s quote in Man-Machine Symbiosis, he says something similar
  22. http://groups.csail.mit.edu/medg/people/psz/Licklider.html
  23. Slide also from Jeff HeerToolchain of work (sort of similar to Clang and LLVM toolchain)
  24. Maybe crowdsourcing can help too, this is based on our work on analyzing smartphone apps, to find unusual behaviors
  25. Polo Chau, Christos Faloutsos, Jason Hong, NikiKitturA bottom-up approach for understanding graphs with hundreds of thousands of nodes and edgesUses a bottom-up approach, where you start with exemplars, and then uses machine learning algorithms to expand and cluster the graph