SYSTEM AND METHOD FOR A CYBER INTELLIGENCE HUB
First Claim
1. A method for defining and forming a cyber intelligence channel/hub (CIH) communicating with consumers, wherein the CIH faces cyber threats in real time, the method comprising:
- Collecting and delivering information, such that web crawlers and scrapers, which characterize the operation of an information collection unit, are designed to ensure that the collection processes are optimized to detect the type of gathered data, its relevancy and origin;
filtering the collected information, by filtering mechanisms founded on advanced algorithms, which consider all the relevant information at real time and enable handling this information in an educated manner;
categorizing the information into groups based on their unique characteristics, collecting capabilities and input and output constraints;
mapping the information and putting it into context, such that a visual presentation of a connection map assists in determining the threats each consumer faces in real time, regardless of the origin of the information, its time stamp or source; and
targeting and pinpointing the information, such that the data collected in the data intelligence collection unit is gathered through innovative technologies that enable automated and massive, yet targeted collection of the data that exists in the cyber space,such that the CIH enables users to detect cyber related threats prior to their occurrence and to by proactively tackle the source of the threats rather than only responding to them.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for defining and forming a cyber intelligence channel communicating with consumers is facing cyber threats in real time. The method includes collecting information, such that web crawlers and scrapers. The method also includes filtering the collected information, by filtering mechanisms founded on advanced algorithms. The method goes on to categorize the information into groups based on their unique characteristics, collecting capabilities and input and output constraints. The method further includes mapping the information and putting it into context and targeting and pinpointing the information, such that the data collected in the data intelligence collection unit is gathered through innovative technologies that enable automated and massive, yet targeted collection of the data that exists in the cyber space.
139 Citations
16 Claims
-
1. A method for defining and forming a cyber intelligence channel/hub (CIH) communicating with consumers, wherein the CIH faces cyber threats in real time, the method comprising:
-
Collecting and delivering information, such that web crawlers and scrapers, which characterize the operation of an information collection unit, are designed to ensure that the collection processes are optimized to detect the type of gathered data, its relevancy and origin; filtering the collected information, by filtering mechanisms founded on advanced algorithms, which consider all the relevant information at real time and enable handling this information in an educated manner; categorizing the information into groups based on their unique characteristics, collecting capabilities and input and output constraints; mapping the information and putting it into context, such that a visual presentation of a connection map assists in determining the threats each consumer faces in real time, regardless of the origin of the information, its time stamp or source; and
targeting and pinpointing the information, such that the data collected in the data intelligence collection unit is gathered through innovative technologies that enable automated and massive, yet targeted collection of the data that exists in the cyber space,such that the CIH enables users to detect cyber related threats prior to their occurrence and to by proactively tackle the source of the threats rather than only responding to them. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 16)
-
-
15. The method of claim 144, wherein the information gathered by the CIH is formatted into a uniform template which is then fed into the advanced analysis engines of the hub for further analysis and information correlation.
Specification