GEOGRAPHICAL VULNERABILITY MITGATION RESPONSE MAPPING SYSTEM
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for geographically mapping a vulnerability of a network having one or more network points include receiving vulnerability information identifying a vulnerability of a point of the network, correlating the vulnerability information with location information for the identified network point, and network identification information for the identified network point, and generating a map displaying a geographical location of the vulnerability.
-
Citations
89 Claims
-
1-68. -68. (canceled)
-
69. A computer-implemented method for displaying a vulnerability of a network comprising one or more network points, the method comprising:
-
receiving, at a computer, network vulnerability information identifying a point of vulnerability in the network; determining a network address of the identified network vulnerability point based on the received network vulnerability information; determining a geographical location of the identified network vulnerability point based on the determined network address of the identified network vulnerability point; receiving mitigation response status information indicative of a status of a mitigation response to the identified network vulnerability point; providing a geographical map including at least the geographical location of the identified network vulnerability point; providing a network vulnerability symbol on the map designating the geographical location of the network vulnerability point; and graphically distinguishing the network vulnerability symbol on the map to indicate the status of the mitigation response. - View Dependent Claims (70, 71, 72, 73, 74, 75)
-
-
76. A non-transitory computer-readable storage medium storing instructions which, when executed by a computer, cause the computer to perform a method for displaying a vulnerability of a network having one or more network points, the method comprising:
-
receiving network vulnerability information identifying a point of vulnerability in the network; determining a network address of the identified network vulnerability point based on the received network vulnerability information; determining a geographical location of the identified network vulnerability point based on the determined network address of the identified network vulnerability point; receiving mitigation response status information indicative of a status of a mitigation response to the identified network vulnerability point; providing a geographical map including at least the geographical location of the identified network vulnerability point; providing a network vulnerability symbol on the map designating the geographical location of the network vulnerability point; and graphically distinguishing the network vulnerability symbol on the map to indicate the status of the mitigation response. - View Dependent Claims (77, 78, 79, 80, 81, 82)
-
-
83. A computer-implemented method for representing vulnerabilities of a network comprising a plurality of network points, the method comprising:
-
receiving, at a computer, network vulnerability information identifying a plurality of vulnerability points on the network; determining network addresses of the identified network vulnerability points based on the received network vulnerability information; determining geographical locations of the identified network vulnerability points based on the determined network addresses of the identified network vulnerability points; receiving mitigation response status information indicative of statuses of mitigation responses to the identified network vulnerability points; providing a geographical map including at least the geographical locations of the identified network vulnerability points; providing network vulnerability symbols on the map designating the geographical location of the network vulnerability points; and graphically distinguishing the network vulnerability symbols on the map to indicate the respective statuses of the mitigation responses to the network vulnerability points. - View Dependent Claims (84, 85, 86, 87, 88, 89)
-
Specification