-
公开(公告)号:US10454958B2
公开(公告)日:2019-10-22
申请号:US15291331
申请日:2016-10-12
Inventor: Asaf Shabtai , Rami Puzis , Lior Rokach , Liran Orevi , Genady Malinsky , Ziv Katzir , Ron Bitton
Abstract: Described embodiments include a system that includes a monitoring agent, configured to automatically monitor usage of a computing device by a user, and a processor. The processor is configured to compute, based on the monitoring, a score indicative of a cyber-security awareness of the user, and to generate an output indicative of the score.
-
公开(公告)号:US20170104778A1
公开(公告)日:2017-04-13
申请号:US15291331
申请日:2016-10-12
Inventor: Asaf Shabtai , Rami Puzis , Lior Rokach , Liran Orevi , Genady Malinsky , Ziv Katzir , Ron Bitton
CPC classification number: H04L63/1425 , G06F21/552 , G06F2221/034 , G06N20/00 , H04L63/1408 , H04L63/1441
Abstract: Described embodiments include a system that includes a monitoring agent, configured to automatically monitor usage of a computing device by a user, and a processor. The processor is configured to compute, based on the monitoring, a score indicative of a cyber-security awareness of the user, and to generate an output indicative of the score.
-
公开(公告)号:US11909754B2
公开(公告)日:2024-02-20
申请号:US16980313
申请日:2018-03-14
Applicant: NEC CORPORATION , B. G. Negev Technologies and Applications Ltd. at Ben-Gurion University
Inventor: Masaki Inokuchi , Yoshinobu Ohta , Ron Bitton , Orly Stan , Asaf Shabtai , Yuval Elovici
CPC classification number: H04L63/1433 , G06F21/577 , H04L63/1416
Abstract: A security assessment system is configured to provide a duplicated environment which duplicates an assessment target system comprising a plurality of physical components. The security assessment system includes a duplicated environment design circuitry and a duplicated environment construction circuitry. The duplicated environment design circuitry is configured to select a duplication level based on constraints specified by a user in order to design the duplicated environment to produce a designed result indicative of a duplicated environment design. The duplication level is indicative of any one of a simulation sub-module, an emulation sub-module, and a physical sub-module which are for reproducing the physical components of the assessment target system. The duplicated environment construction circuitry is configured to construct the duplicated environment based on the designed result. The duplicated environment includes components which are duplicated by one of the duplication level.
-
公开(公告)号:US11783048B2
公开(公告)日:2023-10-10
申请号:US16980269
申请日:2018-03-14
Applicant: NEC CORPORATION , B. G. Negev Technologies and Applications Ltd., at Ben-Gurion University
Inventor: Masaki Inokuchi , Yoshinobu Ohta , Ron Bitton , Orly Stan , Tomer Gluck , Asaf Shabtai , Yuval Elovici
IPC: G06F21/57
CPC classification number: G06F21/577 , G06F2221/034
Abstract: A security assessment system is configured to provide a duplicated environment which duplicates an assessment target system comprising a plurality of physical components. The security assessment system includes a duplicated environment design circuitry and a duplicated environment construction circuitry. The duplicated environment design circuitry is configured to select a duplication level based on constraints specified by a user and effects associated with the physical components in order to design the duplicated environment to produce a designed result indicative of a duplicated environment design. The duplication level is indicative of any one of a simulation sub-module, an emulation sub-module, and a physical sub-module which are for reproducing the physical components of the assessment target system. The duplicated environment construction circuitry is configured to construct the duplicated environment based on the designed result. The duplicated environment includes components which are duplicated by one of the duplication level.
-
公开(公告)号:US20200053114A1
公开(公告)日:2020-02-13
申请号:US16658797
申请日:2019-10-21
Applicant: Verint Systems Ltd.
Inventor: Asaf Shabtai , Rami Puzis , Lior Rokach , Liran Orevi , Genady Malinsky , Ziv Katzir , Ron Bitton
Abstract: Described embodiments include a system that includes a monitoring agent, configured to automatically monitor usage of a computing device by a user, and a processor. The processor is configured to compute, based on the monitoring, a score indicative of a cyber-security awareness of the user, and to generate an output indicative of the score.
-
公开(公告)号:US11601452B2
公开(公告)日:2023-03-07
申请号:US16658797
申请日:2019-10-21
Applicant: Verint Systems Ltd.
Inventor: Asaf Shabtai , Rami Puzis , Lior Rokach , Liran Orevi , Genady Malinsky , Ziv Katzir , Ron Bitton
Abstract: Described embodiments include a system that includes a monitoring agent, configured to automatically monitor usage of a computing device by a user, and a processor. The processor is configured to compute, based on the monitoring, a score indicative of a cyber-security awareness of the user, and to generate an output indicative of the score.
-
-
-
-
-