08 FURTHER RESEARCH DIRECTIONS

We have covered a lot of ground through this course, from the initial ideas around cyber security analytics, through to managing workflows, machine learning and visualisation, and different applications of analysis that may be required. Of course, future research will continue to evolve and we will see greater uses of data analytics to understand the world around us and how best to secure this.

A Cyber Security Analyst’s job is to protect an organisation from cyber threats. They develop protocols that are used to respond to and mitigate the effects of cyber attacks. They protect the organisation’s infrastructure such as computer networks, hardware, and software from cyber criminals. Tools – what tools are being used by cyber security analysts? Evaluation and reporting – how is this done?

Scripting and programming, data management, penetration testing, hacking and countermeasures, and more will all be critical elements of your cybersecurity education.

Visualisation for Cyber Security

The IEEE VizSec conference started in 2004 as the Workshop on Visualization and Data Mining for Computer Security, as a co-located event as part of the IEEE Vis conference – one of the largest International conferences on the topic of data visualisation.

For this session, we will visit some of the recent literature that has been published at the IEEE VizSec conference. We will typically review a set of papers that have been published, and discuss the strengths and weaknesses of the papers, identifying key topic areas being addressed within cyber security, and how visualisation is proposed to alleviate the security challenges. Whilst the conference name has evolved, the actual principle of the conference remains akin to the original name – much of the challenge is in how we mine appropriate data as well as how with they visualise and explore this data. This echoes earlier discussions around the interplay of machine learning and human interaction that we have highlighted in previous sections, but here we can observe the research perspectives of this in cyber security research applications designed to contribute towards our understanding of how visualisation can benefit in cyber security analysis.