Apparatuses, methods and systems for a cyber threat confidence rating visualization and editing user interface
First Claim
1. A non-transitory medium storing code representing a plurality of processor-executable instructions, the code comprising code to cause the processor to:
- display, concurrently;
(1) a graphical representation of a plurality of characteristics of a potential cyber threat to at least one targeted system, the potential cyber threat being associated with a malicious source, and (2) a graphical representation of a first cyber threat confidence score for the potential cyber threat, the cyber threat confidence score being based at least in part on plurality of characteristics of the potential cyber threat;
detect a user interaction with the graphical representation of the plurality of characteristics, the user interaction representing a user-specified adjustment for a characteristic from the plurality of characteristics of the potential cyber threat;
modify a value of the characteristic based on the user-specified adjustment for the characteristic to produce a modified plurality of characteristics of the potential cyber threat;
automatically update the cyber threat confidence score, in response to producing the modified plurality of characteristics of the potential cyber threat, to generate an updated cyber threat confidence score based at least in part on the modified plurality of characteristics of the potential cyber threat; and
provide, to a user, a graphical representation of the modified plurality of characteristics of the potential cyber threat, and a graphical representation of the updated cyber threat confidence score.
11 Assignments
0 Petitions
Accused Products
Abstract
The cyber threat intelligence confidence rating visualization and editing user interface technology (hereinafter “TIC”) provides a user interface that allows a user (e.g., a cyber threat analyst, etc.) to submit ratings for various characteristics associated with a cyber threat indicator. In one embodiment, the TIC may instantiate a user interactive risk evaluation component having a user interface input element for a user to submit calculation weights for one or more characteristics of a cyber threat; generate a graphical representation of a cyber threat confidence score for user interface display via the user interactive risk evaluation component; and dynamically adjust the graphical representation of the threat confidence score using at least one of the one or more characteristics weighted by the user configured weight.
-
Citations
22 Claims
-
1. A non-transitory medium storing code representing a plurality of processor-executable instructions, the code comprising code to cause the processor to:
-
display, concurrently;
(1) a graphical representation of a plurality of characteristics of a potential cyber threat to at least one targeted system, the potential cyber threat being associated with a malicious source, and (2) a graphical representation of a first cyber threat confidence score for the potential cyber threat, the cyber threat confidence score being based at least in part on plurality of characteristics of the potential cyber threat;detect a user interaction with the graphical representation of the plurality of characteristics, the user interaction representing a user-specified adjustment for a characteristic from the plurality of characteristics of the potential cyber threat; modify a value of the characteristic based on the user-specified adjustment for the characteristic to produce a modified plurality of characteristics of the potential cyber threat; automatically update the cyber threat confidence score, in response to producing the modified plurality of characteristics of the potential cyber threat, to generate an updated cyber threat confidence score based at least in part on the modified plurality of characteristics of the potential cyber threat; and provide, to a user, a graphical representation of the modified plurality of characteristics of the potential cyber threat, and a graphical representation of the updated cyber threat confidence score. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory medium storing code representing a plurality of processor-executable instructions, the code comprising code to cause the processor to:
-
display, concurrently;
(1) a graphical representation of a cyber threat confidence score, and (2) a graphical representation of a plurality of characteristics of a potential cyber threat to at least one targeted system, the cyber threat confidence score being based at least in part on the plurality of characteristics of the potential cyber threat;detect a user interaction with the graphical representation of the cyber threat confidence score, the user representation representing a user-specified adjustment for the cyber threat confidence score; define an updated cyber threat confidence score based on the user-specified adjustment for the cyber threat confidence score; automatically update the plurality of characteristics of the potential cyber threat, to generate an updated plurality of characteristics of the potential cyber threat based at least in part on the updated cyber threat confidence score; and provide, to a user, a graphical representation of the updated plurality of characteristics of the cyber threat. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory medium storing code representing a plurality of processor-executable instructions, the code comprising code to cause the processor to:
-
display, concurrently and via a user interface;
(1) a graphical representation of a cyber threat confidence score, (2) a graphical representation of a second cyber threat confidence score, and (3) a graphical representation of a first set of values of a plurality of characteristics of a potential cyber threat to at least one targeted system, the first set of values of the plurality characteristics being associated with the first cyber threat confidence score, the graphical representation separately representing the value of each characteristic from the first set of values of the plurality of characteristics, the first cyber threat confidence score being based at least in part on the first set of values of the plurality of characteristics of the potential cyber threat, the second cyber threat confidence score being based at least in part on a second set of values of the plurality of characteristics;detect a user interaction with the graphical representation of the second cyber threat confidence score, the user interaction representing a user selection of the second cyber threat confidence score; and generate, automatically and in response to receiving the user selection, a graphical representation of the second set of values of the plurality of characteristics and remove the graphical representation of the first set of values, the graphical representation of the second set of values separately representing each characteristic and the value of that characteristic from the second set of values. - View Dependent Claims (21, 22)
-
Specification