PREDICTION OF POTENTIAL CYBER SECURITY THREATS AND RISKS IN AN INDUSTRIAL CONTROL SYSTEM USING PREDICTIVE CYBER ANALYTICS
First Claim
Patent Images
1. A method comprising:
- receiving, by a risk manager system, real-time data from a plurality of connected devices;
creating, by the risk manager system, a data model based on the real-time data;
analyzing, by the risk manager system, the data model to identify potential current threats;
predicting, by the risk manager system, potential threats;
notifying a user, by the risk manager system, of the potential current threats and predicted potential threats.
1 Assignment
0 Petitions
Accused Products
Abstract
This disclosure provides systems and methods for prediction of potential cyber security threats and risks in an industrial control system using predictive cyber analytics. A method includes receiving, by a risk manager system, real-time data from a plurality of connected devices. The method includes creating, by the risk manager system, a data model based on the real-time data. The method includes analyzing, by the risk manager system, the data model to identify potential current threats. The method includes predicting, by the risk manager system, potential threats. The method includes notifying a user, by the risk manager system, of the potential threats.
38 Citations
20 Claims
-
1. A method comprising:
-
receiving, by a risk manager system, real-time data from a plurality of connected devices; creating, by the risk manager system, a data model based on the real-time data; analyzing, by the risk manager system, the data model to identify potential current threats; predicting, by the risk manager system, potential threats; notifying a user, by the risk manager system, of the potential current threats and predicted potential threats. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A risk manager system comprising:
-
a controller; and a memory, the risk manager system configured to; receive real-time data from a plurality of connected devices; create a data model based on the real-time data; analyze the data model to identify potential current threats; predict potential threats; notify a user of the potential current threats and predicted potential threats. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory machine-readable medium encoded with executable instructions that, when executed, cause one or more processors of a risk manager system to:
-
receive real-time data from a plurality of connected devices; create a data model based on the real-time data; analyze the data model to identify potential current threats; predict potential threats; notify a user of the potential current threats and predicted potential threats. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification