摘要:
Systems and methods for geographically mapping an intrusion into a network having one or more network points include receiving intrusion information identifying a intrusion into a point of the network, correlating the intrusion information with location information for the identified network point, and network identification information for the identified network point, and generating a map displaying a geographical location of the intrusion.
摘要:
Systems and methods for locating sources of, or vulnerabilities susceptible to, computer-originated attacks based on GPS devices. In one aspect, methods and systems include receiving threat data or vulnerability data, retrieving GPS data, correlating the threat data or the vulnerability data with the GPS data to create map data, and generating a map, based on the map data, displaying a geographical location of the source of, or the vulnerability susceptible to, a computer-originated attack based on a GPS device.
摘要:
Systems and methods for geographically mapping a vulnerability of a network having one or more network points include receiving vulnerability information identifying a vulnerability of a point of the network, correlating the vulnerability information with location information for the identified network point, and network identification information for the identified network point, and generating a map displaying a geographical location of the vulnerability.
摘要:
Systems and methods for geographically mapping a threat into a network having one or more network points include receiving threat information identifying a threat to a point of the network, correlating the threat information with location information for the identified network point, and network identification information for the identified network point, and generating a map displaying a geographical location of the threat.
摘要:
Systems and methods for geographically mapping an intrusion into a network having one or more network points include receiving intrusion information identifying a intrusion into a point of the network, correlating the intrusion information with location information for the identified network point, and network identification information for the identified network point, and generating a map displaying a geographical location of the intrusion.
摘要:
Systems and methods for geographically mapping a vulnerability of a network having one or more network points include receiving vulnerability information identifying a vulnerability of a point of the network, correlating the vulnerability information with location information for the identified network point, and network identification information for the identified network point, and generating a map displaying a geographical location of the vulnerability.
摘要:
A system and method for detecting transaction anomalies and information reflecting potential fraudulent activities is disclosed. Data is collected from transactions carried out in a number of business applications such as computer systems, telecommunication systems and security systems. This transaction data is normalized to generate transaction data having consistent format for analysis and/or comparison. User profiles are generated by sorting the normalized data by user and identifying particular user characteristics from the sorted data. Each user profile therefore reflects the behavior of the user as it relates to the business applications. The user profiles and/or predetermined rules are then used to detect anomalies in incoming transactions.