Patent classifications
H04L63/0209
SYSTEMS AND METHODS FOR INGESTING DATA IN DISPARATE FORMATS
Data associated a plurality of user interface elements may be retrieved from at least one database associated with a service business, such as a casino. At a first time, a first indication to turn on a first subset of the plurality of user interface elements may be received. The user interface elements may include content management, task management, property management, action management, player profiling, comp management, player development, asset tagging and flagging, profitability and comparative analysis, etc. Each of the first subset of user interface elements may be populated with the respective data associated that user interface element.
COVERT MONITORING OF AN ATTACKER HOST IN A SOFTWARE DEFINED PERIMETER NETWORK
Covert monitoring of an attacker host in a software defined perimeter network, includes: authenticating, by an SDP controller, a first and second host in the SDP network, where the first and second host, after authentication, establish an end-to-end encryption communication session; detecting, by the SDP controller, that the first host is an attacker host and the second host is a victim host; establishing, by the SDP controller as a copy of the victim host, a mimic host; and redirecting, by the SDP controller, communication from the attacker host to the mimic host including migrating, without disruption detectable by the attacker host, the communication session from the victim host to the mimic host, where the mimic host monitors communications with the attacker host.
Securely accessing offline data with indirect communication
Discussed herein are devices, systems, and methods for secure access to offline data. A method can include configuring a device in a task retrieval state and retrieving a task to be executed on a cold storage device while the device is in the task retrieval state, configuring the device in a disconnected state after retrieving the task, and configuring the device in a task execution state after the device is in the disconnected state and executing the task on the cold storage while the device is in the task execution state. In the task retrieval state, the device can communicate with a buffer network and cannot communicate with a cold network. In the disconnected state, the device cannot communicate with either the cold network or the buffer network. In the task execution state, the device can communicate with the cold network and cannot communicate with the buffer network.
Cloud computing architecture with secure multi-cloud integration
Aspects of the disclosure relate to cloud computing architectures. A system may include a plurality of clouds. One or more of the clouds may transfer data to another one or more of the clouds. A data integration platform may control the data transfer. The transfer may be securely routed through the data integration platform. The transfer may be logged, and the log may be transmitted to an administrative network.
COMPUTING SYSTEM AND METHOD FOR OPERATING A COMPUTING SYSTEM
A computing system has a computing device. The computing system has an input data path, which unidirectionally connects an interface device to the computing device, and an output data diode, which unidirectionally connects the computing device to the interface device. The input data path has a data lock which is connected to the interface device by a first terminal and to the computing device by a second terminal. The data lock has a storage unit for storing data and is configured such that the storage unit can be selectively connected solely to the first or second terminal but not to both terminals simultaneously. The computing device accepts data from the interface device solely if the data is transmitted to the computing device from the interface device via the input data path within a transmission session initiated by the computing device using the output data diode.
First Hop Security in Multi-Site Multi-Vendor Cloud
The present disclosure is directed to systems and methods for first hop security in a multi-site and multi-vendor cloud. The method may include receiving, at a first hop security (FHS) device located within a defined security perimeter, a message from a first host; validating a security of the message; signing the message with a signature to prove validation of the message, the signature comprising at least a Crypto-ID Parameters Option (CIPO) and a Neighbor Discovery Protocol Signature Option (NDPSO); and transmitting the signed message to one or more network FHS devices within the security perimeter.
Methods, systems, and media for mitigating damage resulting from a website being an intermediary in a cyberattack
Mechanisms for mitigating damage resulting from a website being an intermediary in a cyberattack, comprising: detecting a domain name server query made to the website; making a request to the website; receiving a header in response to the request; inspecting the header to identify a software stack component of the website; cross-referencing the software stack component to a common vulnerabilities and exposures (CVE) database to identify a CVE that applies to the software stack component; applying a rule to determine the impact of the CVE on whether the website is a possible intermediary in a cyberattack; determining that the website is a possible intermediary in a cyberattack; and taking action on the website to mitigate damage resulting from the website being an intermediary in a cyberattack.
Decryption of encrypted network traffic using an inline network traffic monitor
An inline network traffic monitor is deployed inline between two endpoints of a computer network. A particular endpoint of the two endpoints works in conjunction with the inline network traffic monitor to decrypt encrypted network traffic transmitted between the two endpoints. A series of Change Cipher Spec (CCS) messages is exchanged between the inline network traffic monitor and the particular endpoint during a Transport Layer Security (TLS) handshake between the two endpoints. The series of CCS messages allows the particular endpoint and the inline network traffic monitor to detect each other on the computer network. After detecting each other's presence, the particular endpoint sends the inline network traffic monitor a session key that is used by the two endpoints to encrypt their network traffic. The inline network traffic monitor uses the session key to decrypt encrypted data of the network traffic transmitted between the two endpoints.
OBTAINING INSTRUCTIONS WITHIN A WIND POWER PLANT PRIVATE NETWORK
Obtaining within a private network of a power plant one or more instructions for controlling the power plant, wherein the power plant includes one or more wind turbine generators, and wherein one or more instructions for controlling the power plant are received at an external digital storage device placed externally with respect to the private network. The one or more instructions are stored in a queue in the external digital storage device. The one or more instructions are fetched from the queue independent with respect to events initiated externally with respect to the private network.
Controlling access to external networks by an air-gapped endpoint
A method and system for controlling access to external networks by an air-gapped endpoint is provided. The method includes providing, on the air-gapped endpoint, a plurality of isolated security zones by instantiating a plurality of corresponding virtual machines using a hypervisor; selecting one security zone of the plurality of isolated security zones; and tunneling a traffic from the selected security zone to a designated network location, wherein the tunneling is through a virtual private network (VPN).