Methods and systems for ranking, filtering and patching detected vulnerabilities in a networked system
First Claim
1. A system comprising:
- a processor; and
a memory storing computer-executable instructions that implement a polarizing filter engine and a visual engine;
the polarizing filter engine configured to;
receive, from a backend system including one or more computer servers and monitoring a computer network system, a data block including parameters indicative of cyber security states or operation states of a plurality of assets of the computer network system for display on a display device associated with the system; and
compute, for each visual mode of a plurality of visual modes, using the received data block, corresponding graphical parameters of a graphical representation, associated with that visual mode, of cyber security or operation parameters of the plurality of assets of the computer network system; and
a visualization engine configured to;
display a visual representation of cyber security or operation parameters of the plurality of assets of the computer network system, associated with a visual mode of the plurality of visual modes, using the corresponding graphical parameters;
provide a first set of visual filters, common to the plurality of visual modes, for filtering data of the received data block associated with the displayed visual representation; and
provide a second set of visual filters specific to the visual mode, for filtering the data of the received data block associated with the displayed visual.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for determining priority levels to process vulnerabilities associated with a networked computer system can include a data collection engine receiving a plurality of specification profiles, each defining one or more specification variables of the networked computer system or a respective asset. The data collection engine can receive, from a vulnerability scanner, vulnerability data indicative of a vulnerability associated with the networked computer system. A profiling engine can interrogate a computing device of the networked computer system, and receive one or more respective profiling parameters from that computing device. A ranking engine can compute a priority ranking value of the computing device based on the profile specification variables, the vulnerability data and the profiling parameters. The priority ranking value associated with the computing device can be indicative of a priority level, compared to other computing devices of the computer network, for patching a vulnerability affecting that computing device.
-
Citations
23 Claims
-
1. A system comprising:
-
a processor; and a memory storing computer-executable instructions that implement a polarizing filter engine and a visual engine; the polarizing filter engine configured to; receive, from a backend system including one or more computer servers and monitoring a computer network system, a data block including parameters indicative of cyber security states or operation states of a plurality of assets of the computer network system for display on a display device associated with the system; and compute, for each visual mode of a plurality of visual modes, using the received data block, corresponding graphical parameters of a graphical representation, associated with that visual mode, of cyber security or operation parameters of the plurality of assets of the computer network system; and a visualization engine configured to; display a visual representation of cyber security or operation parameters of the plurality of assets of the computer network system, associated with a visual mode of the plurality of visual modes, using the corresponding graphical parameters; provide a first set of visual filters, common to the plurality of visual modes, for filtering data of the received data block associated with the displayed visual representation; and provide a second set of visual filters specific to the visual mode, for filtering the data of the received data block associated with the displayed visual. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method comprising:
-
receiving, by a computing device, from a backend system including one or more computer servers and monitoring a computer network system, a data block including parameters indicative of cyber security states or operation states of a plurality of assets of the computer network system for display on a display device associated with the computing device; computing, by the computing device, for each visual mode of a plurality of visual modes, using the received data block, corresponding graphical parameters of a graphical representation, associated with that visual mode, of cyber security or operation parameters of the plurality of assets of the computer network system; displaying, by the computing device, a visual representation of cyber security or operation parameters of the plurality of assets of the computer network system, associated with a visual mode of the plurality of visual modes, using the corresponding graphical parameters; providing, by the computing device, a first set of visual filters, common to the plurality of visual modes, for filtering data of the received data block associated with the displayed visual representation; and providing, by the computing device, a second set of visual filters specific to the visual mode, for filtering the data of the received data block associated with the displayed visual. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A non-transitory computer-readable medium comprising computer executable instructions stored thereon, the computer executable instructions when executed by a processor cause the processor to:
-
receive, from a backend system including one or more computer servers and monitoring a computer network system, a data block including parameters indicative of cyber security states or operation states of a plurality of assets of the computer network system for display on a display device associated with the processor; compute, for each visual mode of a plurality of visual modes, using the received data block, corresponding graphical parameters of a graphical representation, associated with that visual mode, of cyber security or operation parameters of the plurality of assets of the computer network system; display a visual representation of cyber security or operation parameters of the plurality of assets of the computer network system, associated with a visual mode of the plurality of visual modes, using the corresponding graphical parameters; provide a first set of visual filters, common to the plurality of visual modes, for filtering data of the received data block associated with the displayed visual representation; and provide a second set of visual filters specific to the visual mode, for filtering the data of the received data block associated with the displayed visual.
-
Specification