Cyber Threat Intelligence Dashboard #1101
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Pull Request for PyVerse 💡
Requesting to submit a pull request to the PyVerse repository.
Issue Title
Please enter the title of the issue related to your pull request.
Enter the issue title here.
Cyber threats intelligence dashboard.
Info about the Related Issue
What's the goal of the project?
The goal of the project is to provide an interactive dashboard for cyber threat intelligence, allowing users to visualize and analyze recent threats, alerts, and other relevant data to enhance cybersecurity awareness and response.
Describe the aim of the project.
The aim of the Cyber Threat Intelligence Dashboard project is to create an interactive and user-friendly platform that aggregates and visualizes data related to cyber threats. This dashboard is designed to help cybersecurity professionals and organizations monitor, analyze, and respond to potential threats effectively.
Name
Please mention your name.
Enter your name here.
Ananya Ravikiran Vastare
GitHub ID
Please mention your GitHub ID.
Enter your GitHub ID here.
@Ananya-vastare
Email ID
Please mention your email ID for further communication.
Enter your email ID here.
[email protected]
Identify Yourself
Mention in which program you are contributing (e.g., WoB, GSSOC, SSOC, SWOC).
GSSOC-extd
Closes
Enter the issue number that will be closed through this PR.
Closes: #issue-number
#1045
Describe the Add-ons or Changes You've Made
Give a clear description of what you have added or modified.
I have developed a Cyber Threat Intelligence Dashboard using Streamlit that provides users with a comprehensive view of cyber threats. The dashboard features functionalities for data visualization, including interactive plots that display trends in threats over time. I implemented a data search feature that allows users to filter threats based on specific keywords in their descriptions. Additionally, I added static datasets to replace API calls for data retrieval, ensuring the application is self-contained and easy to run without reliance on external APIs. The code has been structured for clarity and maintainability, with comments added for better understanding.
Type of Change
Select the type of change:
How Has This Been Tested?
Describe how your changes have been tested.
Testing Process:
I tested the Cyber Threat Intelligence Dashboard by running the application in a local development environment using Streamlit. I verified the functionality of data visualization features by ensuring that the interactive plots correctly displayed trends based on the provided static datasets. I also tested the search functionality to confirm that it accurately filters results based on user input. Additionally, I conducted usability testing by navigating through the dashboard to ensure all components functioned as expected and the user experience was seamless. Finally, I reviewed the code for any potential errors and validated that it met the project’s coding standards, generating no new warnings during execution.
Checklist
Please confirm the following: