SlideShare a Scribd company logo
1 of 20
Download to read offline
DATA BREACH INFORMATION VISUALIZATION SYSTEM
INTRODUCTION:
A DATA BREACH is an incident in which sensitive, protected or confidential
data has potentially been viewed, stolen or used by an individual
unauthorized to do so. The potential impact that data leakage can have on
any organization, can be wide reaching and POTENTIALLY CATASTROPHIC.
cyber security is still in its nascent stages where there are no best
practices established and research is STILL ONGOING.
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
MOTIVATION :
The objective of this project is to expose information about Data Breaches in
Visualization to investigate What, Why and When of a Data Breach.
The Visual Storytelling follows the following approach :
We built a comprehensive comparison model that can guide the users to
discover interesting patterns.
What they all have in common is they usually contain Personal Identifying
Information (PII) in a format easily read by thieves, in other words, not
encrypted.
ADDIONTAL FEATURE :
We also provide a safety check feature that allows users to check if their
details have been compromised in any recent data breaches.
• WHAT HAPPENED IN THE DATA BREACH?
• HOW THE INDUSTRIES WERE BREACHED?
• WHEN THE DATA BREACH HAPPENED?
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
EXISTING VISUALIZATIONS :
Information is beautiful has already created visualizations for data
breach which was updated as of 2015 but we decided to improve this
visualization further.
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
INDUSTRIES THAT SUFFERED DATA BREACHES :
1) Academic
2) Energy
3) Financial
4) Gaming
5) Government
6) Healthcare
7) Media
8) Retail
8) Technology (IT)
9) Telecommunications
10) Transportation
11) Web(E-Commerce)
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
CATEGORIES OF DATA SENSITIVITY :
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
E-mail Address
SSN/Personal Details
Credit Card information
Email password/Health record
Full Bank account details
1
2
3
4
5
METHODS USED IN DATA BREACH:
1) Hacked: Database unauthorized access
2) Lost / Stolen media : Laptop/HDD stolen or lost
3) Accidentally Published : Data exposed by mistake
4) Inside Job : Employee reveals sensitive data
5) Poor Security Implementation: Security controls wrongly implemented.
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
SOURCE OF DATA:
The idTheftcenter.org reported 5,679 number of breaches since 2005 to 2015
with 854,420,502 number of records compromised.
Our dataset comes from various security news portals like securityweek.com
with beach information of more than 200 companies across 13 industries.
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
COMPLETE STORY DESIGN :
WHAT HOW WHEN
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
VISUALIZATION 1 DESIGN: WHAT HAPPENED IN THE DATA BREACH
TYPE OF CHART : Parallel Coordinates
DATA + INTENT : what was the sensitivity level of data that was
compromised , which company suffered data breach , year in which it was
breached, no. of records compromised
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
VISUALIZATION 1 DESIGN: WHAT HAPPENED IN THE DATA BREACH
INTERACTIVE FEATURES :
Cluster by year , organization ,
leak and data sensitivity
Curve smoothness
Bundling strength Variation
CONTROLS :
Brush: Drag vertically along an axis.
Remove Brush: Tap the axis background.
Reorder Axes: Drag a label horizontally.
Invert Axis: Tap an axis label.
Remove Axis: Drag axis label to the left edge.
Table: Hover on the table to get highlighted path and click to get story
Variable Type Encoding
YEAR ORDERED Color Hue
ORGANIZATION CATEGORICAL Color Hue
METHOD_OF_LEAK CATEGORICAL Color Hue
NUMBER OF RECORDS STOLEN QUANTITATIVE N
DATA SENSITIVITY CATEGORICAL Color Hue
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
VISUALIZATION 2 DESIGN : HOW THE DATA BREACHES HAPPENED?
TYPE OF CHART : Bubble pie, Histogram and Pie chart
DATA + INTENT : show you various industries and how these
industries have been breached and allow relative comparison based
on method, number of records compromised.
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
VISUALIZATION 2 DESIGN : HOW THE DATA BREACHES HAPPENED?
INTERACTIVE FEATURES :
Hover on the pie chart or the histogram below to understand the
distribution of method in which data breach was caused across industries.
Each circle is representing an Industry. The size of the circle represents
the number of breaches in that industry.
Hovering on different section provides various aspects in the legends and
the histogram and pie chart.
CONTROLS :
Provides distribution of number of breaches across all industries.
Initially represents a complete distribution of methods in which breach
occurred for all industries.
Variable Type Encoding
METHOD OF LEAK CATEGOTICAL COLOR HUE
ORGANIZATION CATEGORICAL X
NO OF RECORDS BREACHED QUANTITATIVE SIZE
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
VISUALIZATION 3 DESIGN : WHEN THE DATA BREACH HAPPENED?
TYPE OF CHART : Scatter Plot
DATA + INTENT : This visualization is a scatter plot representation to
explain when the data breach happened. The X-axis represents the year the
breach happened and Y axis represents the number of records stolen in the
data breach in logarithmic scale.
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
VISUALIZATION 3 DESIGN : WHEN THE DATA BREACHES HAPPENED?
INTERACTIVE FEATURES :
On click the node displays story of the breach.
Double click opens reference to the source article reported by new media.
CONTROLS :
Comparisons across various organizations using scatter plot with selection
feature to visualize.
Variable Type Encoding
YEAR ORDERED X
NO OF RECORDS STOLEN QUANTITATIVE Y
ORGANIZATION CATEGORICAL SELECTION
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
USER STUDY :
The user study was conducted
to evaluate the
visualization system.
Survey Conducted : 9 Users
Female : 5
Male : 4
Undergraduate : 3
Masters : 3
PhD : 3
Surveys were conducted in
the Hillman Library.
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
USER STUDY RESULT :
The user study revealed interesting observations from the
Users for our Visualizations :
• Most of them were excited about the Hack Check in our
Visualization.
• The system is a great start to learn about Data Breach
security for beginners.
• The concept of story – telling of what, when and how was
impressive.
• The usefulness and usability of the system was rated the
best.
• The Visualization had excess blue and black in the
appearance.
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
ADVANTAGES OF THE VISUAL SYSTEM:
• The whole system gives a overview using different
dimensions of data improving understanding.
• Using interaction for user to explore of data in detail.
• See relationship among data points to understand
correlations among data points.
• See the parts to visualize different levels of data for
better knowledge.
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
CONCLUSIONS :
• Visualizations can help reveal patterns in data breaches.
• Data breach needs more research and information visualization
seems to be a promising approach.
• User interaction with such visual systems can help the user
immerse themselves into the story of the data breach thus
being more comprehensive than news articles.
• Always be careful with your sensitive information when you
register with an internet domain.
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
APPLICATION :
1.Scale the visual system to include more companies by updating the same
data file.
2. This system can be provided as a sampler for introduction to data
breaches for spreading awareness about security and privacy of data.
FUTURE WORK :
1. We can use better zooming abilities for charts.
2. Provide better dataset with data sensitivity levels.
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
TECHNOLOGIES USED :
We achieve our functions by using
1.D3.js
2.Javascript
3.Sweet alert
4.Bootstrap
5.CSS and HTML
6.Github
7.Interactive functions by using jQuery.
Click here for Project Demo!!
Questions?
THANK YOU!
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor

More Related Content

Viewers also liked

Relationships and Dealing with Difficult People
Relationships and Dealing with Difficult PeopleRelationships and Dealing with Difficult People
Relationships and Dealing with Difficult PeopleMSCSA
 
Cem perguntas e respostas 2 edi ca o
Cem perguntas e respostas 2 edi ca oCem perguntas e respostas 2 edi ca o
Cem perguntas e respostas 2 edi ca oFabiana Inácio
 
Lis4380 f13-w1-2
Lis4380 f13-w1-2Lis4380 f13-w1-2
Lis4380 f13-w1-2caseyyu
 
MSCSA Work Plan 2015-16
MSCSA Work Plan 2015-16MSCSA Work Plan 2015-16
MSCSA Work Plan 2015-16MSCSA
 
Overview of the Program Year
Overview of the Program YearOverview of the Program Year
Overview of the Program YearMSCSA
 
زراعة الشعر
زراعة الشعرزراعة الشعر
زراعة الشعرAbdo Hamzawy
 
11 campus budgets
11 campus budgets11 campus budgets
11 campus budgetsMSCSA
 
臻上集团创富商机(28.08.13)
臻上集团创富商机(28.08.13)臻上集团创富商机(28.08.13)
臻上集团创富商机(28.08.13)UpOffshore
 
Lis4380 f13-w4-1
Lis4380 f13-w4-1Lis4380 f13-w4-1
Lis4380 f13-w4-1caseyyu
 
3 h ein-mn
3 h ein-mn3 h ein-mn
3 h ein-mnMSCSA
 
Charting the Future
Charting the Future Charting the Future
Charting the Future MSCSA
 

Viewers also liked (14)

Relationships and Dealing with Difficult People
Relationships and Dealing with Difficult PeopleRelationships and Dealing with Difficult People
Relationships and Dealing with Difficult People
 
All about e-agriculture
All about e-agricultureAll about e-agriculture
All about e-agriculture
 
Cem perguntas e respostas 2 edi ca o
Cem perguntas e respostas 2 edi ca oCem perguntas e respostas 2 edi ca o
Cem perguntas e respostas 2 edi ca o
 
Lis4380 f13-w1-2
Lis4380 f13-w1-2Lis4380 f13-w1-2
Lis4380 f13-w1-2
 
MSCSA Work Plan 2015-16
MSCSA Work Plan 2015-16MSCSA Work Plan 2015-16
MSCSA Work Plan 2015-16
 
Overview of the Program Year
Overview of the Program YearOverview of the Program Year
Overview of the Program Year
 
Manual – learning circles for RuralWeb
Manual – learning circles for RuralWebManual – learning circles for RuralWeb
Manual – learning circles for RuralWeb
 
زراعة الشعر
زراعة الشعرزراعة الشعر
زراعة الشعر
 
Be active
Be activeBe active
Be active
 
11 campus budgets
11 campus budgets11 campus budgets
11 campus budgets
 
臻上集团创富商机(28.08.13)
臻上集团创富商机(28.08.13)臻上集团创富商机(28.08.13)
臻上集团创富商机(28.08.13)
 
Lis4380 f13-w4-1
Lis4380 f13-w4-1Lis4380 f13-w4-1
Lis4380 f13-w4-1
 
3 h ein-mn
3 h ein-mn3 h ein-mn
3 h ein-mn
 
Charting the Future
Charting the Future Charting the Future
Charting the Future
 

Similar to finalPPT

Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idDavid Kelts, CIPT
 
Staying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataStaying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataMolly O'Shea
 
Staying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataStaying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataDataSift
 
Fingerprint Based E Voting System
Fingerprint Based E Voting SystemFingerprint Based E Voting System
Fingerprint Based E Voting Systemijtsrd
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningIRJET Journal
 
Running head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docx
Running head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docxRunning head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docx
Running head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docxjeanettehully
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...Priyanka Aash
 
Final review m score
Final review m scoreFinal review m score
Final review m scoreazhar4010
 
Online Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainOnline Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainIRJET Journal
 
IRJET- Portable Biometric E-Voting System
IRJET- Portable Biometric E-Voting SystemIRJET- Portable Biometric E-Voting System
IRJET- Portable Biometric E-Voting SystemIRJET Journal
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data miningDatamining Tools
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data miningDataminingTools Inc
 
Neo4j - Responsible AI
Neo4j - Responsible AINeo4j - Responsible AI
Neo4j - Responsible AINeo4j
 
How to unlock new data-driven potential for your organization
How to unlock new data-driven potential for your organizationHow to unlock new data-driven potential for your organization
How to unlock new data-driven potential for your organizationMichal Hodinka
 
Securing Data with Block chain and AI ppt
Securing Data with Block chain and AI pptSecuring Data with Block chain and AI ppt
Securing Data with Block chain and AI pptsumayyakousar194
 
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET Journal
 
Data Visualization in Big Data Analytics
Data Visualization in Big Data AnalyticsData Visualization in Big Data Analytics
Data Visualization in Big Data AnalyticsShrinivasTayade
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNINGSENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNINGIRJET Journal
 

Similar to finalPPT (20)

DLD_SYNOPSIS
DLD_SYNOPSISDLD_SYNOPSIS
DLD_SYNOPSIS
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
Staying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataStaying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human Data
 
Staying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataStaying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human Data
 
Fingerprint Based E Voting System
Fingerprint Based E Voting SystemFingerprint Based E Voting System
Fingerprint Based E Voting System
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
Running head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docx
Running head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docxRunning head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docx
Running head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docx
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
 
Final review m score
Final review m scoreFinal review m score
Final review m score
 
Online Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainOnline Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and Blockchain
 
IRJET- Portable Biometric E-Voting System
IRJET- Portable Biometric E-Voting SystemIRJET- Portable Biometric E-Voting System
IRJET- Portable Biometric E-Voting System
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
 
Neo4j - Responsible AI
Neo4j - Responsible AINeo4j - Responsible AI
Neo4j - Responsible AI
 
How to unlock new data-driven potential for your organization
How to unlock new data-driven potential for your organizationHow to unlock new data-driven potential for your organization
How to unlock new data-driven potential for your organization
 
Securing Data with Block chain and AI ppt
Securing Data with Block chain and AI pptSecuring Data with Block chain and AI ppt
Securing Data with Block chain and AI ppt
 
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
 
Data Visualization in Big Data Analytics
Data Visualization in Big Data AnalyticsData Visualization in Big Data Analytics
Data Visualization in Big Data Analytics
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNINGSENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
 

finalPPT

  • 1. DATA BREACH INFORMATION VISUALIZATION SYSTEM INTRODUCTION: A DATA BREACH is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. The potential impact that data leakage can have on any organization, can be wide reaching and POTENTIALLY CATASTROPHIC. cyber security is still in its nascent stages where there are no best practices established and research is STILL ONGOING. Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 2. MOTIVATION : The objective of this project is to expose information about Data Breaches in Visualization to investigate What, Why and When of a Data Breach. The Visual Storytelling follows the following approach : We built a comprehensive comparison model that can guide the users to discover interesting patterns. What they all have in common is they usually contain Personal Identifying Information (PII) in a format easily read by thieves, in other words, not encrypted. ADDIONTAL FEATURE : We also provide a safety check feature that allows users to check if their details have been compromised in any recent data breaches. • WHAT HAPPENED IN THE DATA BREACH? • HOW THE INDUSTRIES WERE BREACHED? • WHEN THE DATA BREACH HAPPENED? Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 3. EXISTING VISUALIZATIONS : Information is beautiful has already created visualizations for data breach which was updated as of 2015 but we decided to improve this visualization further. Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 4. INDUSTRIES THAT SUFFERED DATA BREACHES : 1) Academic 2) Energy 3) Financial 4) Gaming 5) Government 6) Healthcare 7) Media 8) Retail 8) Technology (IT) 9) Telecommunications 10) Transportation 11) Web(E-Commerce) Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 5. CATEGORIES OF DATA SENSITIVITY : Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor E-mail Address SSN/Personal Details Credit Card information Email password/Health record Full Bank account details 1 2 3 4 5
  • 6. METHODS USED IN DATA BREACH: 1) Hacked: Database unauthorized access 2) Lost / Stolen media : Laptop/HDD stolen or lost 3) Accidentally Published : Data exposed by mistake 4) Inside Job : Employee reveals sensitive data 5) Poor Security Implementation: Security controls wrongly implemented. Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 7. SOURCE OF DATA: The idTheftcenter.org reported 5,679 number of breaches since 2005 to 2015 with 854,420,502 number of records compromised. Our dataset comes from various security news portals like securityweek.com with beach information of more than 200 companies across 13 industries. Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 8. COMPLETE STORY DESIGN : WHAT HOW WHEN Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 9. VISUALIZATION 1 DESIGN: WHAT HAPPENED IN THE DATA BREACH TYPE OF CHART : Parallel Coordinates DATA + INTENT : what was the sensitivity level of data that was compromised , which company suffered data breach , year in which it was breached, no. of records compromised Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 10. VISUALIZATION 1 DESIGN: WHAT HAPPENED IN THE DATA BREACH INTERACTIVE FEATURES : Cluster by year , organization , leak and data sensitivity Curve smoothness Bundling strength Variation CONTROLS : Brush: Drag vertically along an axis. Remove Brush: Tap the axis background. Reorder Axes: Drag a label horizontally. Invert Axis: Tap an axis label. Remove Axis: Drag axis label to the left edge. Table: Hover on the table to get highlighted path and click to get story Variable Type Encoding YEAR ORDERED Color Hue ORGANIZATION CATEGORICAL Color Hue METHOD_OF_LEAK CATEGORICAL Color Hue NUMBER OF RECORDS STOLEN QUANTITATIVE N DATA SENSITIVITY CATEGORICAL Color Hue Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 11. VISUALIZATION 2 DESIGN : HOW THE DATA BREACHES HAPPENED? TYPE OF CHART : Bubble pie, Histogram and Pie chart DATA + INTENT : show you various industries and how these industries have been breached and allow relative comparison based on method, number of records compromised. Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 12. VISUALIZATION 2 DESIGN : HOW THE DATA BREACHES HAPPENED? INTERACTIVE FEATURES : Hover on the pie chart or the histogram below to understand the distribution of method in which data breach was caused across industries. Each circle is representing an Industry. The size of the circle represents the number of breaches in that industry. Hovering on different section provides various aspects in the legends and the histogram and pie chart. CONTROLS : Provides distribution of number of breaches across all industries. Initially represents a complete distribution of methods in which breach occurred for all industries. Variable Type Encoding METHOD OF LEAK CATEGOTICAL COLOR HUE ORGANIZATION CATEGORICAL X NO OF RECORDS BREACHED QUANTITATIVE SIZE Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 13. VISUALIZATION 3 DESIGN : WHEN THE DATA BREACH HAPPENED? TYPE OF CHART : Scatter Plot DATA + INTENT : This visualization is a scatter plot representation to explain when the data breach happened. The X-axis represents the year the breach happened and Y axis represents the number of records stolen in the data breach in logarithmic scale. Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 14. VISUALIZATION 3 DESIGN : WHEN THE DATA BREACHES HAPPENED? INTERACTIVE FEATURES : On click the node displays story of the breach. Double click opens reference to the source article reported by new media. CONTROLS : Comparisons across various organizations using scatter plot with selection feature to visualize. Variable Type Encoding YEAR ORDERED X NO OF RECORDS STOLEN QUANTITATIVE Y ORGANIZATION CATEGORICAL SELECTION Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 15. USER STUDY : The user study was conducted to evaluate the visualization system. Survey Conducted : 9 Users Female : 5 Male : 4 Undergraduate : 3 Masters : 3 PhD : 3 Surveys were conducted in the Hillman Library. Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 16. USER STUDY RESULT : The user study revealed interesting observations from the Users for our Visualizations : • Most of them were excited about the Hack Check in our Visualization. • The system is a great start to learn about Data Breach security for beginners. • The concept of story – telling of what, when and how was impressive. • The usefulness and usability of the system was rated the best. • The Visualization had excess blue and black in the appearance. Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 17. ADVANTAGES OF THE VISUAL SYSTEM: • The whole system gives a overview using different dimensions of data improving understanding. • Using interaction for user to explore of data in detail. • See relationship among data points to understand correlations among data points. • See the parts to visualize different levels of data for better knowledge. Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 18. CONCLUSIONS : • Visualizations can help reveal patterns in data breaches. • Data breach needs more research and information visualization seems to be a promising approach. • User interaction with such visual systems can help the user immerse themselves into the story of the data breach thus being more comprehensive than news articles. • Always be careful with your sensitive information when you register with an internet domain. Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 19. APPLICATION : 1.Scale the visual system to include more companies by updating the same data file. 2. This system can be provided as a sampler for introduction to data breaches for spreading awareness about security and privacy of data. FUTURE WORK : 1. We can use better zooming abilities for charts. 2. Provide better dataset with data sensitivity levels. Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 20. TECHNOLOGIES USED : We achieve our functions by using 1.D3.js 2.Javascript 3.Sweet alert 4.Bootstrap 5.CSS and HTML 6.Github 7.Interactive functions by using jQuery. Click here for Project Demo!! Questions? THANK YOU! Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor