You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
🛡️ SENTINEL — Insider Threat Detection & Training Platform
🎯 Project Overview
SENTINEL is an interactive insider threat detection and training platform designed to simulate real-world cybersecurity scenarios. Built with HTML, CSS, and JavaScript, this tool provides a hands-on learning experience for security professionals and analysts.
✨ Key Features
🏢 5 Interactive Modules
Module
Focus
Description
01 — Dashboard
Real-Time Monitoring
Live activity feed, risk scores, anomaly tracking across 152 users
02 — Behavior Analytics
UEBA Profiling
Deep-dive user profiles with risk scoring, timeline analysis, and IOC correlation
03 — Simulations
Decision Training
5 realistic insider threat scenarios with branching decisions and debriefs
04 — Indicators Library
IOC Reference
23 behavioral, technical, contextual, and access indicators with severity ratings
05 — Policy Reference
Compliance Framework
Key insider threat policies, response procedures, and legal frameworks
📊 Module 01: Threat Dashboard
Real-Time KPIs 📈
KPI
Value
Trend
Active Risk Subjects
3 Critical
↑ 2 from yesterday
Anomalies (24h)
47
↑ 12% above baseline
Data Exfil Attempts
9
3 blocked by DLP
Privilege Violations
2
All contained
Live Activity Feed ⚡
Real-time alerts with severity badges (CRITICAL/HIGH/MEDIUM/NORMAL)
Timestamped events with detailed metadata
Color-coded severity indicators:
🔴 CRITICAL — Immediate action required
🟠 HIGH — Escalate to management
🟡 MEDIUM — Investigate within 24h
🟢 NORMAL — Routine monitoring
Sample Feed Events
Time
Event
Severity
just now
Marcus Webb exported 4.8 GB database file
🔴 CRITICAL
4m ago
DLP blocked Sandra Osei email with attachment
🟠 HIGH
11m ago
Jason Tremblay disabled audit logging
🔴 CRITICAL
23m ago
David Achebe: abnormal CRM export volume
🟡 MEDIUM
High-Risk Subjects 🚨
5 top-risk employees displayed with:
Risk score (0-100)
Risk level (CRITICAL/HIGH/MEDIUM/LOW)
Visual risk bar
Click to view full analytics profile
Weekly Anomaly Chart 📊
7-day trend with stacked categories:
🔴 Exfiltration — Data theft attempts
🟠 Access Abuse — Unauthorized access
🟡 Policy Violation — Policy breaches
🔵 Credential Anomaly — Suspicious auth patterns
👤 Module 02: Behavior Analytics
5 Employee Profiles 🧑💼
Employee
Role
Risk Level
Score
Key Indicators
Marcus Webb
Sr. Database Admin
🔴 CRITICAL
87
Mass database exports, USB activity, HR access, resignation notice
Sandra Osei
Financial Analyst
🟠 HIGH
72
Personal email exfiltration, excessive printing, failed logins
Timeline view of recent activity with flag severity
Timeline Activity ⏱️
Each timeline entry includes:
Timestamp
Event description
Technical detail
Severity flag (CRITICAL/HIGH/MEDIUM/NORMAL)
Color-coded line for visual tracking
Sample Timeline Entries
02:14 AM — Large SQL dump exported · customer_data.sql · 4.8 GB 🔴 CRITICAL
11:45 PM — VPN access from new geo-location · Chicago IL (home: Dallas TX) 🟠 HIGH
07:45 PM — Email to personal account flagged by DLP · Q4_Projections_Final.xlsx 🟠 HIGH
🎮 Module 03: Insider Threat Simulations
5 Realistic Scenarios 🕵️
Scenario
Difficulty
Type
Time
Description
The Departing Admin
🔴 HARD
Data Exfiltration
~12 min
Privileged admin in notice period exports 4.8 GB database — malicious or legitimate?
The Disgruntled Analyst
🟠 MEDIUM
Data Leakage
~8 min
Analyst after negative review attempts email exfiltration and excessive printing
Employee shares credentials with coworker who accesses unauthorized HR data
The Shadow IT Operator
🟠 MEDIUM
Policy Evasion
~8 min
Sales manager uses unauthorized cloud storage and messaging apps
Simulation Features 🎯
Multi-scene narratives (3-4 scenes per simulation)
Evidence panels with 6+ data points per scene
Multiple-choice decisions with letter indicators (A/B/C/D)
Immediate feedback explaining why choices are correct/incorrect
Detailed debrief with score and performance grade
Score tracking (X/4, X/3 correct)
Sample Decision Points
SCENE 01: 02:14 AM — Marcus Webb exported 4.8 GB SQL file from production database.
He's in his 2-week notice period. What is your FIRST response?
[A] Immediately lock Marcus's account and escalate to management and legal
[B] Flag the alert, check for approved tickets, and monitor further ✓
[C] Email Marcus asking him to explain the export
[D] Delete the exported file from the server remotely
Debrief Grades 🏆
Score
Grade
Color
100%
EXPERT
🟢 Green
≥75%
PROFICIENT
🔵 Cyan
≥50%
DEVELOPING
🟡 Yellow
<50%
NEEDS REVIEW
🔴 Red
📚 Module 04: Indicators Library
23 IOCs Across 4 Categories 🔍
Category
Indicators
Description
Technical
8
Mass data export, audit log tampering, USB devices, concurrent sessions, DLP triggers
Behavioral
6
Triggering life events, resignation, out-of-scope access, expressed grievances, competitor research
// Module 1: DashboardrenderDashboard()// Render activity feed, risk list, weekly chart// Module 2: AnalyticsrenderAnalytics()// Render employee selector and profileselectEmployee(id)// Switch active employeerenderProfile()// Display selected employee's profile and timeline// Module 3: SimulationsrenderSimulations()// Render simulation cardsstartSim(simId)// Launch simulation playerrenderScene()// Render current scene with evidence and choicescheckSimAnswer()// Validate answer and provide feedbacknextScene()// Advance to next sceneshowDebrief()// Display final score and performance grade// Module 4: IndicatorsrenderIndicators()// Render IOC table with category filtering// Module 5: PolicyrenderPolicy()// Render policy reference content// NavigationshowView(id)// Switch between modules
🛡️ SENTINEL — Detect, Investigate, and Respond to Insider Threats 🛡️
Last updated: March 2025
About
SENTINEL is an immersive insider threat detection and training platform designed for security analysts, SOC teams, and IT professionals. Featuring a fully simulated UEBA (User and Entity Behavior Analytics) environment, interactive threat simulations, and comprehensive indicators of compromise (IOCs) library🔒👨🏿💻.