Hyun

My work and me

About Me

Hello, my name is Hyun — I am a designer and technologist creating symbiotic relationships between information and people. I am currently working with researchers, engineers and designers at IBM Research in Yorktown Heights, New York.
If you have any questions or have something in mind for discussion, please don't hesitate to contact me.

Commercial

Community

Recreational

Legacy

IBM Security X-Force Exchange

IBM Security X-Force Exchange

2013-Current — Commercial :: Technologist and User Experience Designer working at IBM

Teaser image for the IBM Security X-Force Exchange project.

SYNOPSIS: Software security vulnerabilities have always been documented in separate websites that specialize in a particular platform or vulnerability. IBM Security X-Force Exchange is a product designed for security analysts to monitor cyber attacks in near real time, report on software security vulnerabilities, and collaborate to discover, fix, and research issues with others.

Major Skills Applied

  • User Experience Support
  • Front-end Development Support
  • Ad-hoc Technology Interpreter

All projects at IBM Design are worked on and produced in teams. My specific contributions for X-Force Exchange were mainly on technology research, future designs, and giving a hand on front-end development.

Problem

NOMAD is the word that comes to mind for all the security resource websites. A lot of resources specialize in a specific set of vulnerabilities, focusing on particular use cases on how the vulnerability could be used; this results in an inadequate context for the security analyst to grasp how the vulnerability could be applied to their organization. The job responsibilities of our users requires gathering as much information as possible regarding cyber security threats that could cause harm to their company.

The personas below were crafted by the involved designers and researcher from banking and enterprise IT companies in North America and Western Europe. The data gathered to create these personas involved shadowing and interviewing current as well as prospective clients.

A community-based, threat-intelligence system can bring many advantages to the table compared to separate resources. When working in a community, one may bring insight to each software vulnerability using collaboration as a tool itself in order to surface more attack vectors. With additional insight and information, such discussions have a possibility of surfacing additional vulnerabilities and zero-day attacks.

  1. 1. Research on trending threats
  2. 2. Collaborate and contribute
  3. 3. Repeat

A pretty basic but widely used research method is expected from the users of X-Force who wish to collaborate on security issues.

Process

REFRESHER: At IBM it is widely known that the development team loves to use Java wherever they can. With this product team however, newer technologies like Angular, NodeJS, and NoSQL were used to create the product. The design team quickly became an advocate of using X-Force Exchange as a role model for writing new code and using new technologies. The design team and development team worked closely to turn problems into opportunistic design ideas and iterate them using potential customer feedback as well as research data. The main production teams were as follows...

  1. Liz, Design Lead :: UX and Visual
  2. Oen, Visual Designer
  3. Cameron, Motion and Visual Designer
  4. Blake, Visual Designer
  5. Allison, Visual and Content Designer
  6. Patrick, UX Designer and Researcher
  7. Danny, Front-end Developer
  8. Hyun, UX Designer and Technologist
  9. Development Team
  10. Product Management

During the design and development production phase lasting a year, the original designs and prototypes were followed by the development teams, however, a lot of minor details were left out in the final production code. Upon initial release some animations and specific micro interactions were left out. The design team has worked extensively with the development team (located both overseas and intrastate) to implement the correct designs in the product, by providing more specific examples and code.

Final Product

Screenshot of X-Force Exchange homepage.
Screenshot of X-Force Exchange homepage.
Screenshot of X-Force Exchange map view in fullscreen.
Screenshot of X-Force Exchange map view in fullscreen.
Screenshot of X-Force Exchange security incident report.
Screenshot of X-Force Exchange security incident report.