SECURE INTEGRATED CYBERSPACE SECURITY AND SITUATIONAL AWARENESS SYSTEM
First Claim
1. A method of securing an organization against cyberspace vulnerabilities, the method comprising:
- receiving a definition of physical and logical locations of data managed by the organization;
receiving a definition of one or more business rules representing detected circumstances under which the data may be compromised;
monitoring the data based on the business rules and definition of the physical and logical locations of data to detect a cyberspace or electronic data vulnerability;
generating one or more reports based on monitoring the data and relating at least in part to access of the data; and
communicating, via a secure communications module, the one or more reports to an individual included within a community of interest, the secure communications module cryptographically securing the one or more reports using an encryption key associated with the community of interest.
5 Assignments
0 Petitions
Accused Products
Abstract
An integrated cube security system for an organization, such as a governmental or private organization, is disclosed, as well as a method of monitoring security for such an organization against cyberspace vulnerabilities. One such method includes receiving a definition of physical and logical locations of data managed by the organization, and receiving a definition of one or more business rules representing detected circumstances under which the data may be compromised. The method also includes monitoring the data based on the business rules and definition of the physical and logical locations of data to detect a cyberspace or electronic data vulnerability. The method includes generating one or more reports based on monitoring the data and relating at least in part to access of the data, and communicating, via a secure communications module, the one or more reports to an individual included within a community of interest.
-
Citations
20 Claims
-
1. A method of securing an organization against cyberspace vulnerabilities, the method comprising:
-
receiving a definition of physical and logical locations of data managed by the organization; receiving a definition of one or more business rules representing detected circumstances under which the data may be compromised; monitoring the data based on the business rules and definition of the physical and logical locations of data to detect a cyberspace or electronic data vulnerability; generating one or more reports based on monitoring the data and relating at least in part to access of the data; and communicating, via a secure communications module, the one or more reports to an individual included within a community of interest, the secure communications module cryptographically securing the one or more reports using an encryption key associated with the community of interest. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of operating a security system associated with an organization, the security system configured to protect against cyberspace and electronic data vulnerabilities, the method comprising:
-
defining one or more physical and logical locations of data managed by the organization; defining one or more business rules representing detected circumstances under which the data may be compromised; submitting authentication information of a user to personally authenticate the user using credentials uniquely associated with the user; upon authentication of the user, establishing a secure communication connection between a computing device operated by the user and a report engine, the secure communication connection providing cryptographic security between the computing device and the report engine and using an encryption key associated with a community of interest including the user; and receiving, via the secure communication connection, one or more reports based on monitoring the data based on the business rules and definition of the physical and logical locations of data, the one or more reports including information regarding detected cyberspace and electronic data vulnerabilities and encrypted by the encryption key. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A method of monitoring vulnerability of an organization against cyberspace and electronic data attacks, the method comprising:
-
receiving, via a secure communications module, one or more reports based on monitoring of sensitive data affiliated with an organization and relating at least in part to access of the sensitive data; wherein the sensitive data is monitored across a network affiliated by the organization to detect a cyberspace or electronic data vulnerability; and wherein the one or more reports are communicated to an individual included within a community of interest defined using a secure communications module, the secure communications module cryptographically securing the one or more reports using an encryption key associated with the community of interest. - View Dependent Claims (17, 18, 19, 20)
-
Specification