Wireless Cyber Assets Discovery Visualization

As wireless networking has become near ubiquitous, the ability to discover, identify, and locate mobile cyber assets over time is becoming increasingly important to information security auditors, penetration testers, and network administrators. We describe a new prototype called MeerCAT (Mobile Cybe...

Full description

Saved in:
Bibliographic Details
Published inVisualization for Computer Security pp. 136 - 143
Main Authors Prole, Kenneth, Goodall, John R., D’Amico, Anita D., Kopylec, Jason K.
Format Book Chapter
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin Heidelberg
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:As wireless networking has become near ubiquitous, the ability to discover, identify, and locate mobile cyber assets over time is becoming increasingly important to information security auditors, penetration testers, and network administrators. We describe a new prototype called MeerCAT (Mobile Cyber Asset Tracks) for visualizing wireless assets, including their location, security attributes, and relationships. This paper highlights our latest iteration of our prototype for visual analysis of wireless asset data, including user requirements and the various coordinated visualizations.
ISBN:3540859314
9783540859314
ISSN:0302-9743
1611-3349
DOI:10.1007/978-3-540-85933-8_13