Cyber-security presence monitoring and assessment
First Claim
Patent Images
1. A cyber-security system comprising:
- a cyber-traffic event analysis system implemented at least partially in hardware, and a cyber-security data processing system implemented at least partially in hardware;
wherein the cyber-traffic event analysis system is configured to;
monitor a communications network for confidential information associated with a consumer account associated with a consumer;
determine, based on a number of devices on the communications network storing the confidential information and a number of digital accounts associated with the consumer on the communications network, a value indicative of a risk of a data breach;
detect evidence of the data breach of the confidential information associated with the consumer account as a result of the monitoring; and
report the evidence of the data breach to the cyber-security data processing system;
wherein the cyber-security data processing system is configured to;
receive the evidence of the data breach associated with the consumer account;
determine, based on the evidence of the data breach, a probability that a future use of the confidential information will impact the consumer; and
adjust the value based on the probability.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, computer-readable media, software, and apparatuses may monitor consumer information in order to determine a probability of a data breach associated with a customer based on an online presence of the customer. The probability of a data breach may be used to present metrics to a consumer and/or a service provider. Further, the consumer may be presented with information indicating what factors contribute to the probability of a data breach, as well as information regarding how to reduce those factors.
-
Citations
21 Claims
-
1. A cyber-security system comprising:
-
a cyber-traffic event analysis system implemented at least partially in hardware, and a cyber-security data processing system implemented at least partially in hardware; wherein the cyber-traffic event analysis system is configured to; monitor a communications network for confidential information associated with a consumer account associated with a consumer; determine, based on a number of devices on the communications network storing the confidential information and a number of digital accounts associated with the consumer on the communications network, a value indicative of a risk of a data breach; detect evidence of the data breach of the confidential information associated with the consumer account as a result of the monitoring; and report the evidence of the data breach to the cyber-security data processing system;
wherein the cyber-security data processing system is configured to;receive the evidence of the data breach associated with the consumer account; determine, based on the evidence of the data breach, a probability that a future use of the confidential information will impact the consumer; and
adjust the value based on the probability. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
determining, by a security monitoring device, one or more accounts comprising confidential information associated with a consumer; scanning, by the security monitoring device, a local network associated with the consumer for one or more local devices on the local network; determine, based on the scanning, a number of devices on the local network storing the confidential information and a number of digital accounts associated with the consumer on the local network; monitoring, by the security monitoring device, an external network for a data breach associated with the confidential information; determining, by the security monitoring device, a value based on the determining the one or more accounts, the scanning the local network, the number of devices, the number of digital accounts and the monitoring the external network; and transmitting, by the security monitoring device, the value for presentation to the consumer. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A cyber-security data processing system comprising a cyber-traffic event analysis system and a cyber-security data processing system:
-
a processor implemented at least partially in hardware; a memory unit storing computer-executable instructions, which when executed by the processor, cause the cyber-security data processing system to; monitor a communications network for confidential information associated with a consumer; determine, based on a number of devices on the communications network storing the confidential information and a number of digital accounts associated with the consumer on the communications network, a value indicative of a risk of a data breach; detect one or more instances of the confidential information on the communications network as a result of the monitoring; and receive additional information associated with the consumer from a service provider; determine a probability of a future fraudulent use of the confidential information impacting the consumer based on the one or more instances and the additional information; and adjust the value based on the probability. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification