SlideShare a Scribd company logo
1 of 20
DATA BREACH INFORMATION VISUALIZATION SYSTEM
INTRODUCTION:
A DATA BREACH is an incident in which sensitive, protected or confidential
data has potentially been viewed, stolen or used by an individual
unauthorized to do so. The potential impact that data leakage can have on
any organization, can be wide reaching and POTENTIALLY CATASTROPHIC.
cyber security is still in its nascent stages where there are no best
practices established and research is STILL ONGOING.
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
MOTIVATION :
The objective of this project is to expose information about Data Breaches in
Visualization to investigate What, Why and When of a Data Breach.
The Visual Storytelling follows the following approach :
We built a comprehensive comparison model that can guide the users to
discover interesting patterns.
What they all have in common is they usually contain Personal Identifying
Information (PII) in a format easily read by thieves, in other words, not
encrypted.
ADDIONTAL FEATURE :
We also provide a safety check feature that allows users to check if their
details have been compromised in any recent data breaches.
• WHAT HAPPENED IN THE DATA BREACH?
• HOW THE INDUSTRIES WERE BREACHED?
• WHEN THE DATA BREACH HAPPENED?
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
EXISTING VISUALIZATIONS :
Information is beautiful has already created visualizations for data
breach which was updated as of 2015 but we decided to improve this
visualization further.
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
INDUSTRIES THAT SUFFERED DATA BREACHES :
1) Academic
2) Energy
3) Financial
4) Gaming
5) Government
6) Healthcare
7) Media
8) Retail
8) Technology (IT)
9) Telecommunications
10) Transportation
11) Web(E-Commerce)
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
CATEGORIES OF DATA SENSITIVITY :
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
E-mail Address
SSN/Personal Details
Credit Card information
Email password/Health record
Full Bank account details
1
2
3
4
5
METHODS USED IN DATA BREACH:
1) Hacked: Database unauthorized access
2) Lost / Stolen media : Laptop/HDD stolen or lost
3) Accidentally Published : Data exposed by mistake
4) Inside Job : Employee reveals sensitive data
5) Poor Security Implementation: Security controls wrongly implemented.
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
SOURCE OF DATA:
The idTheftcenter.org reported 5,679 number of breaches since 2005 to 2015
with 854,420,502 number of records compromised.
Our dataset comes from various security news portals like securityweek.com
with beach information of more than 200 companies across 13 industries.
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
COMPLETE STORY DESIGN :
WHAT HOW WHEN
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
VISUALIZATION 1 DESIGN: WHAT HAPPENED IN THE DATA BREACH
TYPE OF CHART : Parallel Coordinates
DATA + INTENT : what was the sensitivity level of data that was
compromised , which company suffered data breach , year in which it was
breached, no. of records compromised
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
VISUALIZATION 1 DESIGN: WHAT HAPPENED IN THE DATA BREACH
INTERACTIVE FEATURES :
Cluster by year , organization ,
leak and data sensitivity
Curve smoothness
Bundling strength Variation
CONTROLS :
Brush: Drag vertically along an axis.
Remove Brush: Tap the axis background.
Reorder Axes: Drag a label horizontally.
Invert Axis: Tap an axis label.
Remove Axis: Drag axis label to the left edge.
Table: Hover on the table to get highlighted path and click to get story
Variable Type Encoding
YEAR ORDERED Color Hue
ORGANIZATION CATEGORICAL Color Hue
METHOD_OF_LEAK CATEGORICAL Color Hue
NUMBER OF RECORDS STOLEN QUANTITATIVE N
DATA SENSITIVITY CATEGORICAL Color Hue
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
VISUALIZATION 2 DESIGN : HOW THE DATA BREACHES HAPPENED?
TYPE OF CHART : Bubble pie, Histogram and Pie chart
DATA + INTENT : show you various industries and how these
industries have been breached and allow relative comparison based
on method, number of records compromised.
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
VISUALIZATION 2 DESIGN : HOW THE DATA BREACHES HAPPENED?
INTERACTIVE FEATURES :
Hover on the pie chart or the histogram below to understand the
distribution of method in which data breach was caused across industries.
Each circle is representing an Industry. The size of the circle represents
the number of breaches in that industry.
Hovering on different section provides various aspects in the legends and
the histogram and pie chart.
CONTROLS :
Provides distribution of number of breaches across all industries.
Initially represents a complete distribution of methods in which breach
occurred for all industries.
Variable Type Encoding
METHOD OF LEAK CATEGOTICAL COLOR HUE
ORGANIZATION CATEGORICAL X
NO OF RECORDS BREACHED QUANTITATIVE SIZE
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
VISUALIZATION 3 DESIGN : WHEN THE DATA BREACH HAPPENED?
TYPE OF CHART : Scatter Plot
DATA + INTENT : This visualization is a scatter plot representation to
explain when the data breach happened. The X-axis represents the year the
breach happened and Y axis represents the number of records stolen in the
data breach in logarithmic scale.
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
VISUALIZATION 3 DESIGN : WHEN THE DATA BREACHES HAPPENED?
INTERACTIVE FEATURES :
On click the node displays story of the breach.
Double click opens reference to the source article reported by new media.
CONTROLS :
Comparisons across various organizations using scatter plot with selection
feature to visualize.
Variable Type Encoding
YEAR ORDERED X
NO OF RECORDS STOLEN QUANTITATIVE Y
ORGANIZATION CATEGORICAL SELECTION
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
USER STUDY :
The user study was conducted
to evaluate the
visualization system.
Survey Conducted : 9 Users
Female : 5
Male : 4
Undergraduate : 3
Masters : 3
PhD : 3
Surveys were conducted in
the Hillman Library.
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
USER STUDY RESULT :
The user study revealed interesting observations from the
Users for our Visualizations :
• Most of them were excited about the Hack Check in our
Visualization.
• The system is a great start to learn about Data Breach
security for beginners.
• The concept of story – telling of what, when and how was
impressive.
• The usefulness and usability of the system was rated the
best.
• The Visualization had excess blue and black in the
appearance.
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
ADVANTAGES OF THE VISUAL SYSTEM:
• The whole system gives a overview using different
dimensions of data improving understanding.
• Using interaction for user to explore of data in detail.
• See relationship among data points to understand
correlations among data points.
• See the parts to visualize different levels of data for
better knowledge.
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
CONCLUSIONS :
• Visualizations can help reveal patterns in data breaches.
• Data breach needs more research and information visualization
seems to be a promising approach.
• User interaction with such visual systems can help the user
immerse themselves into the story of the data breach thus
being more comprehensive than news articles.
• Always be careful with your sensitive information when you
register with an internet domain.
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
APPLICATION :
1.Scale the visual system to include more companies by updating the same
data file.
2. This system can be provided as a sampler for introduction to data
breaches for spreading awareness about security and privacy of data.
FUTURE WORK :
1. We can use better zooming abilities for charts.
2. Provide better dataset with data sensitivity levels.
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
TECHNOLOGIES USED :
We achieve our functions by using
1.D3.js
2.Javascript
3.Sweet alert
4.Bootstrap
5.CSS and HTML
6.Github
7.Interactive functions by using jQuery.
Click here for Project Demo!!
Questions?
THANK YOU!
Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor

More Related Content

What's hot

wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
Numaan Huq
 
The Surveillance Project is Real
The Surveillance Project is RealThe Surveillance Project is Real
The Surveillance Project is Real
Christos Beretas
 
CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015
Jörn Weber
 
White Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US LocalizedWhite Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US Localized
Stuart Clarke
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
Adam Heller
 

What's hot (20)

Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891
 
wp-us-cities-exposed
wp-us-cities-exposedwp-us-cities-exposed
wp-us-cities-exposed
 
Analyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - ChinaAnalyst Report: The Digital Universe in 2020 - China
Analyst Report: The Digital Universe in 2020 - China
 
web 30.pptx
web 30.pptxweb 30.pptx
web 30.pptx
 
The Surveillance Project is Real
The Surveillance Project is RealThe Surveillance Project is Real
The Surveillance Project is Real
 
Top 5 it security threats for 2015
Top 5 it security threats for 2015Top 5 it security threats for 2015
Top 5 it security threats for 2015
 
Threats_Report_2013
Threats_Report_2013Threats_Report_2013
Threats_Report_2013
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligence
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015CORMA-FW REPRINT-APR2015
CORMA-FW REPRINT-APR2015
 
Industry Trendsin Information Security
Industry Trendsin Information SecurityIndustry Trendsin Information Security
Industry Trendsin Information Security
 
White Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US LocalizedWhite Paper - Nuix Cybersecurity - US Localized
White Paper - Nuix Cybersecurity - US Localized
 
Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication Challenge
 
Getting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensicsGetting a clue: uncovering the truth about your data with mobile forensics
Getting a clue: uncovering the truth about your data with mobile forensics
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 

Similar to Data Breach Visualization

Fingerprint Based E Voting System
Fingerprint Based E Voting SystemFingerprint Based E Voting System
Fingerprint Based E Voting System
ijtsrd
 
Running head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docx
Running head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docxRunning head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docx
Running head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docx
jeanettehully
 
Final review m score
Final review m scoreFinal review m score
Final review m score
azhar4010
 
Ashish sonal_banglore
Ashish sonal_bangloreAshish sonal_banglore
Ashish sonal_banglore
IPPAI
 

Similar to Data Breach Visualization (20)

DLD_SYNOPSIS
DLD_SYNOPSISDLD_SYNOPSIS
DLD_SYNOPSIS
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
Staying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataStaying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human Data
 
Staying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human DataStaying on the Right Side of the Fence when Analyzing Human Data
Staying on the Right Side of the Fence when Analyzing Human Data
 
Fingerprint Based E Voting System
Fingerprint Based E Voting SystemFingerprint Based E Voting System
Fingerprint Based E Voting System
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
Running head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docx
Running head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docxRunning head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docx
Running head PROTECTING CONFIDENTIAL INFORMATION1PROTECTIN.docx
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
 
Final review m score
Final review m scoreFinal review m score
Final review m score
 
Online Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and BlockchainOnline Voting System Using Fingerprint sensor and Blockchain
Online Voting System Using Fingerprint sensor and Blockchain
 
IRJET- Portable Biometric E-Voting System
IRJET- Portable Biometric E-Voting SystemIRJET- Portable Biometric E-Voting System
IRJET- Portable Biometric E-Voting System
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
 
Neo4j - Responsible AI
Neo4j - Responsible AINeo4j - Responsible AI
Neo4j - Responsible AI
 
How to unlock new data-driven potential for your organization
How to unlock new data-driven potential for your organizationHow to unlock new data-driven potential for your organization
How to unlock new data-driven potential for your organization
 
Securing Data with Block chain and AI ppt
Securing Data with Block chain and AI pptSecuring Data with Block chain and AI ppt
Securing Data with Block chain and AI ppt
 
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...IRJET-  	  Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
IRJET- Study Paper on: Ontology-based Privacy Data Chain Disclosure Disco...
 
Data Visualization in Big Data Analytics
Data Visualization in Big Data AnalyticsData Visualization in Big Data Analytics
Data Visualization in Big Data Analytics
 
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNINGSENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
 
Ashish sonal_banglore
Ashish sonal_bangloreAshish sonal_banglore
Ashish sonal_banglore
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Data Breach Visualization

  • 1. DATA BREACH INFORMATION VISUALIZATION SYSTEM INTRODUCTION: A DATA BREACH is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. The potential impact that data leakage can have on any organization, can be wide reaching and POTENTIALLY CATASTROPHIC. cyber security is still in its nascent stages where there are no best practices established and research is STILL ONGOING. Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 2. MOTIVATION : The objective of this project is to expose information about Data Breaches in Visualization to investigate What, Why and When of a Data Breach. The Visual Storytelling follows the following approach : We built a comprehensive comparison model that can guide the users to discover interesting patterns. What they all have in common is they usually contain Personal Identifying Information (PII) in a format easily read by thieves, in other words, not encrypted. ADDIONTAL FEATURE : We also provide a safety check feature that allows users to check if their details have been compromised in any recent data breaches. • WHAT HAPPENED IN THE DATA BREACH? • HOW THE INDUSTRIES WERE BREACHED? • WHEN THE DATA BREACH HAPPENED? Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 3. EXISTING VISUALIZATIONS : Information is beautiful has already created visualizations for data breach which was updated as of 2015 but we decided to improve this visualization further. Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 4. INDUSTRIES THAT SUFFERED DATA BREACHES : 1) Academic 2) Energy 3) Financial 4) Gaming 5) Government 6) Healthcare 7) Media 8) Retail 8) Technology (IT) 9) Telecommunications 10) Transportation 11) Web(E-Commerce) Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 5. CATEGORIES OF DATA SENSITIVITY : Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor E-mail Address SSN/Personal Details Credit Card information Email password/Health record Full Bank account details 1 2 3 4 5
  • 6. METHODS USED IN DATA BREACH: 1) Hacked: Database unauthorized access 2) Lost / Stolen media : Laptop/HDD stolen or lost 3) Accidentally Published : Data exposed by mistake 4) Inside Job : Employee reveals sensitive data 5) Poor Security Implementation: Security controls wrongly implemented. Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 7. SOURCE OF DATA: The idTheftcenter.org reported 5,679 number of breaches since 2005 to 2015 with 854,420,502 number of records compromised. Our dataset comes from various security news portals like securityweek.com with beach information of more than 200 companies across 13 industries. Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 8. COMPLETE STORY DESIGN : WHAT HOW WHEN Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 9. VISUALIZATION 1 DESIGN: WHAT HAPPENED IN THE DATA BREACH TYPE OF CHART : Parallel Coordinates DATA + INTENT : what was the sensitivity level of data that was compromised , which company suffered data breach , year in which it was breached, no. of records compromised Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 10. VISUALIZATION 1 DESIGN: WHAT HAPPENED IN THE DATA BREACH INTERACTIVE FEATURES : Cluster by year , organization , leak and data sensitivity Curve smoothness Bundling strength Variation CONTROLS : Brush: Drag vertically along an axis. Remove Brush: Tap the axis background. Reorder Axes: Drag a label horizontally. Invert Axis: Tap an axis label. Remove Axis: Drag axis label to the left edge. Table: Hover on the table to get highlighted path and click to get story Variable Type Encoding YEAR ORDERED Color Hue ORGANIZATION CATEGORICAL Color Hue METHOD_OF_LEAK CATEGORICAL Color Hue NUMBER OF RECORDS STOLEN QUANTITATIVE N DATA SENSITIVITY CATEGORICAL Color Hue Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 11. VISUALIZATION 2 DESIGN : HOW THE DATA BREACHES HAPPENED? TYPE OF CHART : Bubble pie, Histogram and Pie chart DATA + INTENT : show you various industries and how these industries have been breached and allow relative comparison based on method, number of records compromised. Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 12. VISUALIZATION 2 DESIGN : HOW THE DATA BREACHES HAPPENED? INTERACTIVE FEATURES : Hover on the pie chart or the histogram below to understand the distribution of method in which data breach was caused across industries. Each circle is representing an Industry. The size of the circle represents the number of breaches in that industry. Hovering on different section provides various aspects in the legends and the histogram and pie chart. CONTROLS : Provides distribution of number of breaches across all industries. Initially represents a complete distribution of methods in which breach occurred for all industries. Variable Type Encoding METHOD OF LEAK CATEGOTICAL COLOR HUE ORGANIZATION CATEGORICAL X NO OF RECORDS BREACHED QUANTITATIVE SIZE Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 13. VISUALIZATION 3 DESIGN : WHEN THE DATA BREACH HAPPENED? TYPE OF CHART : Scatter Plot DATA + INTENT : This visualization is a scatter plot representation to explain when the data breach happened. The X-axis represents the year the breach happened and Y axis represents the number of records stolen in the data breach in logarithmic scale. Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 14. VISUALIZATION 3 DESIGN : WHEN THE DATA BREACHES HAPPENED? INTERACTIVE FEATURES : On click the node displays story of the breach. Double click opens reference to the source article reported by new media. CONTROLS : Comparisons across various organizations using scatter plot with selection feature to visualize. Variable Type Encoding YEAR ORDERED X NO OF RECORDS STOLEN QUANTITATIVE Y ORGANIZATION CATEGORICAL SELECTION Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 15. USER STUDY : The user study was conducted to evaluate the visualization system. Survey Conducted : 9 Users Female : 5 Male : 4 Undergraduate : 3 Masters : 3 PhD : 3 Surveys were conducted in the Hillman Library. Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 16. USER STUDY RESULT : The user study revealed interesting observations from the Users for our Visualizations : • Most of them were excited about the Hack Check in our Visualization. • The system is a great start to learn about Data Breach security for beginners. • The concept of story – telling of what, when and how was impressive. • The usefulness and usability of the system was rated the best. • The Visualization had excess blue and black in the appearance. Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 17. ADVANTAGES OF THE VISUAL SYSTEM: • The whole system gives a overview using different dimensions of data improving understanding. • Using interaction for user to explore of data in detail. • See relationship among data points to understand correlations among data points. • See the parts to visualize different levels of data for better knowledge. Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 18. CONCLUSIONS : • Visualizations can help reveal patterns in data breaches. • Data breach needs more research and information visualization seems to be a promising approach. • User interaction with such visual systems can help the user immerse themselves into the story of the data breach thus being more comprehensive than news articles. • Always be careful with your sensitive information when you register with an internet domain. Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 19. APPLICATION : 1.Scale the visual system to include more companies by updating the same data file. 2. This system can be provided as a sampler for introduction to data breaches for spreading awareness about security and privacy of data. FUTURE WORK : 1. We can use better zooming abilities for charts. 2. Provide better dataset with data sensitivity levels. Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor
  • 20. TECHNOLOGIES USED : We achieve our functions by using 1.D3.js 2.Javascript 3.Sweet alert 4.Bootstrap 5.CSS and HTML 6.Github 7.Interactive functions by using jQuery. Click here for Project Demo!! Questions? THANK YOU! Mayank Sardana, Pavitraa Parthasarathy, Prashanth Kumar, Siddharth Coontoor