Visualizing cyber security: Usable workspaces