In the last years, several standards and frameworks have been developed to help organizations to increase the security of their Information Technology (IT) systems. In order to deal with the continuous evolution of the cyber-attacks complexity, such solutions have to cope with an overwhelming set of concepts, and are perceived as complex and hard to implement. The exploration of the cyber-security state of an organization can be made more effective and proficient if supported by the right level of automation. This paper presents the implementation of a visual analytics solution, called CybeR secUrity fraMework BrowSer (CRUMBS) [2], targeted at dealing with the Italian Adaptation of the Cyber Security Framework (IACSF), derived by the National Institute of Standards and Technology (NIST) proposal [1], adaptation that, in its full complexity, presents the security managers with hundreds of scattered concepts, like functions, categories, subcategories, priorities, maturity levels, current and target profiles, and controls, making its adoption a complex activity. The prototype is available at: http://awareserver.dis.uniroma1.it:11768/crumbs/.

Visual exploration and analysis of the italian cybersecurity framework / Angelini, Marco; Blasilli, Graziano; Lenti, Simone; Santucci, Giuseppe. - ELETTRONICO. - (2018). (Intervento presentato al convegno AVI '18 2018 international conference on advanced visual interfaces, AVI '18 tenutosi a Castiglione della Pescaia, Grosseto, Italy) [10.1145/3206505.3206579].

Visual exploration and analysis of the italian cybersecurity framework

Angelini, Marco
;
Blasilli, Graziano
;
Lenti, Simone
;
Santucci, Giuseppe
2018

Abstract

In the last years, several standards and frameworks have been developed to help organizations to increase the security of their Information Technology (IT) systems. In order to deal with the continuous evolution of the cyber-attacks complexity, such solutions have to cope with an overwhelming set of concepts, and are perceived as complex and hard to implement. The exploration of the cyber-security state of an organization can be made more effective and proficient if supported by the right level of automation. This paper presents the implementation of a visual analytics solution, called CybeR secUrity fraMework BrowSer (CRUMBS) [2], targeted at dealing with the Italian Adaptation of the Cyber Security Framework (IACSF), derived by the National Institute of Standards and Technology (NIST) proposal [1], adaptation that, in its full complexity, presents the security managers with hundreds of scattered concepts, like functions, categories, subcategories, priorities, maturity levels, current and target profiles, and controls, making its adoption a complex activity. The prototype is available at: http://awareserver.dis.uniroma1.it:11768/crumbs/.
2018
AVI '18 2018 international conference on advanced visual interfaces, AVI '18
nist cybersecurity framework; italian cybersecurity framework; visual analytics
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Visual exploration and analysis of the italian cybersecurity framework / Angelini, Marco; Blasilli, Graziano; Lenti, Simone; Santucci, Giuseppe. - ELETTRONICO. - (2018). (Intervento presentato al convegno AVI '18 2018 international conference on advanced visual interfaces, AVI '18 tenutosi a Castiglione della Pescaia, Grosseto, Italy) [10.1145/3206505.3206579].
File allegati a questo prodotto
File Dimensione Formato  
Angelini_Visual-exploration-framework_2018.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 768.49 kB
Formato Adobe PDF
768.49 kB Adobe PDF   Contatta l'autore
AVI2018_Frontespizio-inidce_2018.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 1.26 MB
Formato Adobe PDF
1.26 MB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1119430
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 2
  • ???jsp.display-item.citation.isi??? 1
social impact