CPC H04L 63/1425 (2013.01) [G06N 5/02 (2013.01)] | 38 Claims |
1. A computer implemented method comprising:
normalizing, by at least one processor, cyber information received for a plurality of cyberspace entities;
generating, by the at least one processor, cyber-graphs based on relationships between two or more of the plurality of cyberspace entities;
receiving, by the at least one processor, a cyber-threat inquiry of the cyber-graphs;
selecting, based on the cyber-threat inquiry, one or more cyber-graphs that represent impacts on a plurality of functions critical to organization mission operations associated with a plurality of selected IP addresses suspected to be compromised by a cyber-threat actor;
generating, by the at least one processor, a visualization of a result of the cyber-threat inquiry within a corresponding operational environment, wherein the visualization comprises one or more graphical layers rendered over imagery of a corresponding geographical environment; and
wherein at least one of the normalizing, generating, and receiving are performed by one or more computers.
|