Geographical vulnerability mitgation response mapping system
First Claim
Patent Images
1. A computer-implemented method for displaying a vulnerability of a network comprising one or more computers, the method comprising:
- receiving network vulnerability information identifying a vulnerable computer in the network;
determining a network address of the identified vulnerable computer based on the received network vulnerability information;
determining a geographical location of the identified vulnerable computer based on the determined network address of the identified vulnerable computer;
receiving mitigation response status information indicative of a status of a mitigation response to the identified vulnerable computer;
providing a geographical map including at least the geographical location of the identified vulnerable computer;
providing a network vulnerability symbol on the map designating the geographical location of the vulnerable computer; and
graphically distinguishing the network vulnerability symbol on the map to indicate the status of the mitigation response.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for geographically mapping a vulnerability of a network having one or more network points include receiving vulnerability information identifying a vulnerability of a point of the network, correlating the vulnerability information with location information for the identified network point, and network identification information for the identified network point, and generating a map displaying a geographical location of the vulnerability.
-
Citations
21 Claims
-
1. A computer-implemented method for displaying a vulnerability of a network comprising one or more computers, the method comprising:
-
receiving network vulnerability information identifying a vulnerable computer in the network; determining a network address of the identified vulnerable computer based on the received network vulnerability information; determining a geographical location of the identified vulnerable computer based on the determined network address of the identified vulnerable computer; receiving mitigation response status information indicative of a status of a mitigation response to the identified vulnerable computer; providing a geographical map including at least the geographical location of the identified vulnerable computer; providing a network vulnerability symbol on the map designating the geographical location of the vulnerable computer; and graphically distinguishing the network vulnerability symbol on the map to indicate the status of the mitigation response. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable storage medium storing instructions which, when executed by a computer, cause the computer to perform a method for displaying a vulnerability of a network having one or more network points, the method comprising:
-
receiving network vulnerability information identifying a vulnerable computer in the network; determining a network address of the identified vulnerable computer based on the received network vulnerability information; determining a geographical location of the identified vulnerable computer based on the determined network address of the identified vulnerable computer; receiving mitigation response status information indicative of a status of a mitigation response to the identified vulnerable computer; providing a geographical map including at least the geographical location of the identified vulnerable computer; providing a network vulnerability symbol on the map designating the geographical location of the vulnerable computer; and graphically distinguishing the network vulnerability symbol on the map to indicate the status of the mitigation response. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method for representing vulnerabilities of a network comprising a plurality of network points, the method comprising:
-
receiving, at a computer, network vulnerability information identifying a plurality of vulnerable computers on the network; determining network addresses of the identified vulnerable computers based on the received network vulnerability information; determining geographical locations of the identified vulnerable computers based on the determined network addresses of the identified vulnerable computers; receiving mitigation response status information indicative of statuses of mitigation responses to the identified vulnerable computers; providing a geographical map including at least the geographical locations of the identified vulnerable computers; providing network vulnerability symbols on the map designating the geographical locations of the vulnerable computers; and graphically distinguishing the network vulnerability symbols on the map to indicate the respective statuses of the mitigation responses to the vulnerable computers. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification