摘要:
A traveler safety information correlation system is provided. An interactive, real-time mapping tool is combined with traveler location and alert information data sources. Recorded locations corresponding to human assets are overlaid on geographical maps enabling an operator to determine real or near real-time locations of human assets, such as an organizations employees. Traveler location information may obtained from computerized reservation systems, credit card processing systems, cellular and wireless computer networks, and/or other systems. The traveler safety information correlation system may also be used to generate alerts and to deliver information messages to human assets.
摘要:
A system, method and computer program product are provided for monitoring data traffic on one or more networks, determining the classification of the data based on an organization's classification rules, and assigning a classification to one or more entities involved in the transmission of the data, the classification being based at least in part on the classification of the data being transmitted. The classification rules may be based on an organization's classification categories of confidentiality, integrity and availability (CIA). The system, method and computer program product are also provided for implementing controls based on the classifications of the various entities, such as issuing an alert and/or preventing transmission of data if the data is transmitted between two entities that have different classifications.
摘要:
A method and system are disclosed for assessing cyber-based risks in an enterprise organization. A database comprising vulnerability data associated with computers in an enterprise is combined with a second database comprising data of users of computers in an enterprise, along with a third database base indicating the relationship of the users in an organization structure in the enterprise. From the synthesis of data in these separate databases, text based reports detailing aggregate computer vulnerabilities can be produced on a computer, as well as organizational charts depicting the relationship between selected individuals and their computer vulnerabilities. Using such reports, individuals charged with cyber-security can assess organizational cyber risks and allocate resources as appropriate.
摘要:
An apparatus, method, system, and computer program product are provided for producing a geographical mapping of the status, activity, security, work-force, and other information of call centers. The systems and methods may receive call center data and call data, generate a geographical data, and display at least a portion of the geographical data.
摘要:
Systems and methods for user-initiated location-based services through messaging. Using a messaging client running on a communication device, a user transmits location information via a text and/or instant message to a recipient. The location information may be obtained from a GPS program or other location determining program accessible or installed on the user's communication device. A network identifier such as a URL is created based on the location information and is appended into the message. When the recipient selects the network identifier, electronic content such as a graphic map including the sender's location is displayed on the recipient's communication device.
摘要:
A system, method and computer program product for graphically overlaying multiple types of events in order to facilitate determining one or more courses of action are each disclosed. Events are received from an event detection system or from another source, correlated with an address or location, and representatively mapped on an electronic map configured to be displayed on a display device. Mapped events may include cyber attacks or intrusions, credit card fraud based on the location of use of the credit card, check (and check-card) fraud based on usage location, 911 calls, law enforcement demographic data, and telecommunications based fraud.
摘要:
Preferred systems and methods for geographically mapping intrusions through network or authentication data and flight data correlation are described. In one aspect, methods and systems include receiving threat data, receiving network or authentication data, receiving flight location data, correlating the threat data and the network or authentication data with the flight location data to generate map data, and generating a map displaying a geographical location of the intrusion based on the map data.
摘要:
Systems and methods for mapping threats (or vulnerabilities to attacks) based on a correlation of location data, such as wireless location data or a physical location, with an network address associated with a threat are provided. In one aspect, methods and systems include receiving threat data, retrieving location data, correlating the threat data with the location data to create map data, and generating a map, based on the map data, displaying a geographical location of the threat. Threat locations may be determined for wired and wireless telecommunications systems.
摘要:
An apparatus, method, system, and computer program product are provided for producing a geographical mapping of the status, activity, security, work-force, and other information of call centers. The systems and methods may receive call center data and call data, generate a geographical data, and display at least a portion of the geographical data.
摘要:
A system and method for identifying threat locations including a receiver to receive threat data identifying a threat, one or more processors configured to retrieve location data from one or more databases based on the threat data, and an output to provide floor plan information identifying threat location based on the location data at a display.