🌞💻🥉 a comprehensive dashboard of stats and information for organizations that is public data so the world can see what is going on with them in terms of bugs, jobs everything that would make sense to display for an organization even stock ticker price.
Task Description: Cyber Security Dashboard
Background
As a company dealing with sensitive data, it is crucial to keep track of our cyber security stats to ensure the safety and integrity of our systems. We need to have a comprehensive view of all the security-related incidents, events, and activities in our network.
Task
Your task is to create a cyber security dashboard that provides a complete overview of our cyber security posture. The dashboard should be accessible to all relevant stakeholders in the company, including security analysts, IT administrators, and executives.
Requirements
The dashboard should include the following components:
-
Summary of security incidents: A summary of all the security incidents that have occurred over the last month, including the severity level, status, and affected systems.
-
Threat intelligence: A real-time feed of the latest threat intelligence, including information on the most recent malware, phishing attempts, and other security threats.
-
Network traffic analysis: A visualization of the network traffic that shows how traffic is flowing between different systems and how much traffic each system is generating.
-
User behavior analytics: A dashboard that analyzes user behavior and identifies any suspicious activity, such as attempts to access sensitive data or unusual login patterns.
-
Vulnerability management: A summary of all the vulnerabilities that have been identified in our systems, including their severity level, status, and recommended remediation steps.
-
Compliance monitoring: A dashboard that monitors compliance with relevant regulations and standards, such as PCI DSS or HIPAA.
Evaluation
Your cyber security dashboard will be evaluated based on the following criteria:
-
Completeness: Does the dashboard provide a complete overview of our cyber security posture?
-
Usability: Is the dashboard user-friendly and easy to navigate?
-
Accuracy: Does the dashboard provide accurate and up-to-date information?
-
Customizability: Can the dashboard be customized to meet the specific needs of different stakeholders?
-
Visual appeal: Is the dashboard visually appealing and easy to understand?
Deliverables
You are expected to deliver the following:
-
A fully functional cyber security dashboard that meets the requirements outlined above.
-
Documentation on how to use and customize the dashboard.
-
A presentation that explains the design choices you made and how the dashboard meets the evaluation criteria.
Resources
You may use any tools or technologies to create the dashboard, as long as they meet our security requirements. You will have access to our network logs, threat intelligence feeds, vulnerability scanners, and compliance reports.
List view
0 issues of 11 selected
- Status: Open.#1704 In OWASP-BLT/BLT;
- Status: Open.#2476 In OWASP-BLT/BLT;
- Status: Open.#2477 In OWASP-BLT/BLT;
- Status: Open.#2472 In OWASP-BLT/BLT;
- Status: Open.#2478 In OWASP-BLT/BLT;
- Status: Open.#2473 In OWASP-BLT/BLT;
- Status: Open.#2479 In OWASP-BLT/BLT;
- Status: Open.#2474 In OWASP-BLT/BLT;
- Status: Open.#2480 In OWASP-BLT/BLT;
- Status: Open.#2475 In OWASP-BLT/BLT;