Patent classifications
H04L41/22
UTILIZING MODELS TO INTEGRATE DATA FROM MULTIPLE SECURITY SYSTEMS AND IDENTIFY A SECURITY RISK SCORE FOR AN ASSET
A device may receive security data identifying assets of an entity, security issues associated with the assets, and objectives associated with the assets and may utilize a data model to generate, based on the security data, asset related data identifying mapped sets of security data. The device may process a first portion of the asset related data, with a first model, to calculate an asset risk likelihood score for an asset of the assets and may process a second portion of the asset related data, with a second model, to calculate an asset criticality score for the asset. The device may process a third portion of the asset related data, with a third model, to calculate an asset control effectiveness score for the asset and may combine the scores to generate a security risk score for the asset. The device may provide the security risk score for display.
Friend location sharing mechanism for social media platforms
A server system for a map-based social media platform maintains user location information to enable the rendering of friend icons on a map at a corresponding display locations. The system maintains a per user access control list (ACL) that lists all users whose icons can be viewed by a requesting user. The ACL can include a designation of respective display granularity levels for different friend users.
Friend location sharing mechanism for social media platforms
A server system for a map-based social media platform maintains user location information to enable the rendering of friend icons on a map at a corresponding display locations. The system maintains a per user access control list (ACL) that lists all users whose icons can be viewed by a requesting user. The ACL can include a designation of respective display granularity levels for different friend users.
Phishing attempt search interface
Systems, methods, and media are used to identify phishing attacks. A notification of a phishing attempt with a parameter associated with a recipient of the phishing attempt is received at a security management node. In response, an indication of the phishing attempt is presented in a phishing attempt search interface. The phishing attempt search interface may be used to search for additional recipients, identify which recipients have been successfully targeted, and provide a summary of the recipients. Using this information, appropriate security measures in response to the phishing attempt for the recipients may be performed.
Phishing attempt search interface
Systems, methods, and media are used to identify phishing attacks. A notification of a phishing attempt with a parameter associated with a recipient of the phishing attempt is received at a security management node. In response, an indication of the phishing attempt is presented in a phishing attempt search interface. The phishing attempt search interface may be used to search for additional recipients, identify which recipients have been successfully targeted, and provide a summary of the recipients. Using this information, appropriate security measures in response to the phishing attempt for the recipients may be performed.
Method and apparatus for initiating internet connection speed testing on a residential gateway
In one example, a method and apparatus for initiating internet connection speed tests in residential gateways are disclosed. In one example, the method initiates, by a residential gateway of a subscriber premises, a test of an internet connection speed associated with the subscriber premises, such that the residential gateway and a test server are endpoints for an exchange of test data. A speed of the exchange of the test data is then measured.
Method and apparatus for initiating internet connection speed testing on a residential gateway
In one example, a method and apparatus for initiating internet connection speed tests in residential gateways are disclosed. In one example, the method initiates, by a residential gateway of a subscriber premises, a test of an internet connection speed associated with the subscriber premises, such that the residential gateway and a test server are endpoints for an exchange of test data. A speed of the exchange of the test data is then measured.
Network node memory utilization analysis
Systems, methods, and computer-readable media analyzing memory usage in a network node. A network assurance appliance may be configured to query a node in the network fabric for a number of hardware level entries, stored in memory for the node, that are associated with a concrete level network rule. The network assurance appliance may identify a logical level network intent associated with the concrete level network rule, identify a logical level component of the logical level network intent, and attribute the number of hardware level entries to the logical level component.
Network node memory utilization analysis
Systems, methods, and computer-readable media analyzing memory usage in a network node. A network assurance appliance may be configured to query a node in the network fabric for a number of hardware level entries, stored in memory for the node, that are associated with a concrete level network rule. The network assurance appliance may identify a logical level network intent associated with the concrete level network rule, identify a logical level component of the logical level network intent, and attribute the number of hardware level entries to the logical level component.
Direct linking within applications
In some embodiments, a method includes: receiving, by a computing device, information indicative of user interface (UI) elements of an application and inputs received by the UI elements; identifying, by the computing device, a feature of the application based on the received information; generating, by the computing device, a direct link to the feature by determining, from the received information, one or more of the UI elements that received inputs to navigate to the feature; and providing, by the computing device, the direct link to one or more users of the application, wherein in response to an input received on the direct link, the direct link interacts with the one or more UI elements to navigate to the application feature.