Relationship mapping - Internet Security
Amongst a mass of unstructured data, hidden patterns can emerge.
These 'link graphs' show some compelling relationships between attacker and victim in the realm of Internet security.
Adding color to these graphs further adds to the value of the diagram by showing active nodes in the center (in red) and quieter attackers on the outside (in green).
Copyright dataviz Australia 2010