Skip to content
Open
No due date
Last updated Apr 5, 2025
15% complete

🌞💻🥉 a comprehensive dashboard of stats and information for organizations that is public data so the world can see what is going on with them in terms of bugs, jobs everything that would make sense to display for an organization even stock ticker price.

Task Description: Cyber Security Dashboard

Background

As a company dealing with sensitive data, it is crucial to keep track of our cyber security stats to ensure the safety and integrity of our systems. We need to have a comprehensive view of all the security-related incidents, events, and activities in our network.

Task

Your task is to create a cyber security dashboard that provides a complete overview of our cyber security posture. The dashboard should be accessible to all relevant stakeholders in the company, including security analysts, IT administrators, and executives.

Requirements

The dashboard should include the following components:

  • Summary of security incidents: A summary of all the security incidents that have occurred over the last month, including the severity level, status, and affected systems.

  • Threat intelligence: A real-time feed of the latest threat intelligence, including information on the most recent malware, phishing attempts, and other security threats.

  • Network traffic analysis: A visualization of the network traffic that shows how traffic is flowing between different systems and how much traffic each system is generating.

  • User behavior analytics: A dashboard that analyzes user behavior and identifies any suspicious activity, such as attempts to access sensitive data or unusual login patterns.

  • Vulnerability management: A summary of all the vulnerabilities that have been identified in our systems, including their severity level, status, and recommended remediation steps.

  • Compliance monitoring: A dashboard that monitors compliance with relevant regulations and standards, such as PCI DSS or HIPAA.

Evaluation

Your cyber security dashboard will be evaluated based on the following criteria:

  • Completeness: Does the dashboard provide a complete overview of our cyber security posture?

  • Usability: Is the dashboard user-friendly and easy to navigate?

  • Accuracy: Does the dashboard provide accurate and up-to-date information?

  • Customizability: Can the dashboard be customized to meet the specific needs of different stakeholders?

  • Visual appeal: Is the dashboard visually appealing and easy to understand?

Deliverables

You are expected to deliver the following:

  • A fully functional cyber security dashboard that meets the requirements outlined above.

  • Documentation on how to use and customize the dashboard.

  • A presentation that explains the design choices you made and how the dashboard meets the evaluation criteria.

Resources

You may use any tools or technologies to create the dashboard, as long as they meet our security requirements. You will have access to our network logs, threat intelligence feeds, vulnerability scanners, and compliance reports.

List view