In many instances, the webcast recipients may be information technology IT professionals responsible for security and stability of organizational data systems.
Since different organizations, depending on the size and sophistication of the organization, may have dramatically different information requirements, the criteria for selecting webcast recipients for a particular video segment may depend on, for example, the user's system hardware, platform, server software. Other additional factors may determine which users receive different programs or security alerts, such as the geographic location of the user's system, or the individual preferences of the IT professionals representing the organization.
In certain embodiments, a webcast viewer may have an opportunity to choose the categories of alerts that they would like to receive, and may be able to register and un-register for specific programs.
Customers with low-bandwidth equipment may be able to access the live broadcast or archived data as audio-only presentations. For example streaming audio or downloaded audio, corresponding to the broadcast of a security alert, may be sent to a mobile device. Referring to FIG. As is shown in FIG. Block includes the dialtone video content , that is, the content that will be broadcast during periods of time when no other specific security programming is scheduled, and no security alert is being reported.
The feed showing the GNOC floor may continue until a scheduled program or security alert is ready to be broadcast, at which time the dialtone view of the GNOC floor may be superseded, or interrupted, by the program or incident response security alert. Block represents the pre-produced and pre-scheduled security-related programs which may be periodically broadcast over the network.
A programming schedule may be predetermined by the channel producers and distributed to customers or posted on a web site related to the broadcast channel. Since scheduled programs are pre-produced, such programs may be scheduled for broadcasting on a weekly, daily, or hourly schedule, and may be consistently broadcast at the same relative time and in the same format to attract and retain viewers for that particular program.
Block represents security alerts which may be broadcast over the channel at any time, possibly superseding the dialtone programming, or superseding a pre-scheduled program. Since security alerts represent the most recent information available, and often require of a rapid dissemination of this information, they may be quickly produced and broadcast, or even broadcast live over the channel. Thus, the incident response security alerts may have rapid data analysis and minimal production time, and little or no delay between completion of the internet alert video segment and its broadcast over the channel.
Block represents the video content which will be broadcast over the channel during the time period shown in this example. The broadcast is continuous, that is, even when no security alert or scheduled program is being broadcast, viewers will see the dialtone programming The pre-recorded, and pre-scheduled programs , , and may periodically interrupt the dialtone programming Incident response security alerts and may interrupt either the dialtone programming , or a pre-scheduled program airing on the channel when the security alert is information is received at the data center.
In this example, security alert was received during a scheduled program The program may be superseded by the internet alert , so that viewers will not see the scheduled program , but instead will see the current, and possibly urgent, security alert In alternative embodiments, the scheduled program may be paused, and may resume from the point its broadcast was first interrupted by the security alert This promotional material illustrates several different examples of ISNN programming.
These ISNN programs, and the several other program descriptions following, are not a complete list of ISNN programming content, but are merely illustrative embodiments described to illustrate possible uses of the ISNN. This feed, along with several potential scrolling zippers or other on-screen graphics, may represent the ISNN dialtone broadcast. As discussed above, this program may be superseded by a scheduled program, such as those discussed below, or by an incident response security alert report created in response to new security data received at the ISNN data center Daily Newscast.
The ISNN may broadcast one daily special report, summarizing recent developments and news in the fields of internet security. This report may be near-live, with a minimal content approval delay. Expert Interview. This program provides the network an expert presence, and may be separately marketable to other broadcast networks and news venues.
This interview may run approximate five minutes in length, and include static screen shots, and no location roll. The interview may be current events oriented, such as discussions of technical innovations, or reflections on recent events in a perspective piece.
Customer Interview. Monthly Feature. The ISNN may broadcast one or more monthly feature programming segments. These segments may be five to seven minutes long, and may report on an in-depth study of a single network issue. Such monthly features may not be as time-sensitive or specific as security alerts or other news updates, but may review issues in greater detail and depth. This program may report one or more composite indices periodically computed based on system and network monitoring programs.
The report may further break down the score of each component of the TRI and demonstrate the computation of the complete TRI composite value.
In this example, the TRI may indicate the relative quantity of sources and relative quantity of reconnaissance probes on the internet. Reconnaissance probes, which may be manual or automatic, attempt to identify hosts, or target IP addresses, that may be vulnerable for exploit.
In this example, the TRI value generation processes counts the number of unique hosts, or source IP addresses, performing scanning and counts the number of probes associated with that scanning.
The processing then applies a formula and weighting factors to measured counts to provide a relative measure of activity. These measurements may be taken periodically over time. A series of measurements may be use to evaluate the general trends in activity, or to provide a measurement of the level of attack-reconnaissance activity on the internet.
Measurements may be taken on an hourly basis, so that the current TRI value, as well as the current TRI trend, may be reported and analyzed for customers during this weather report. Other indices may similarly be generated and reported during this weather report, including another index, or a variation of the TRI, that is only calculated on a daily or weekly basis.
While the foregoing descriptions and the associated drawings may relate to a internet security news network, the present disclosure is adaptable to the many modifications, for example, stock tickers, traveler information systems, emergency preparedness, and other embodiments that will come to mind to one skilled in the art, having the benefit of the teachings presented. A method for multicasting internet security news to subscribers of an internet security news network, comprising: receiving data relating to internet security, said receiving data relating to internet security including receiving an information feed, said information feed including a video presentation by a forensic analyst, said video presentation including one or more of protocols affects by a virus, install locations of virus protection software, and install locations of a patch specific to the virus; and.
The method of claim 1 , said video content comprising graphics describing at least one of the composite index value, the index trend, and the individual components of the index. The method of claim 1 , wherein said information feed describes an incident response security alert, transmitted from a mobile unit, the location of said mobile unit being related to an incident response security alert.
The method of claim 1 , further comprising the step of verifying the source of the internet security data. The method of claim 1 , further comprising the step of decrypting encrypted internet security data.
A method for broadcasting internet security news, comprising the steps of: transmitting default video content over a broadcast channel;. The method of claim 6 , said broadcast channel comprising a cable television broadcasting channel.
The method of claim 6 , said default video content comprising a live video recording of said internet security data center. The method of claim 8 , said produced video content comprising a video recording of a news broadcast related to internet security, said news broadcast recorded at a dedicated internet security news studio.
A non-transitory computer-readable medium having computer-executable instructions for performing steps comprising: receiving internet security-related data from an internet security monitoring software program;. The non-transitory computer-readable medium of claim 10 , wherein the transmitting said video content comprises a webcast. The non-transitory computer-readable medium of claim 10 , wherein said graphical video content comprises at least one of the composite index value, the index trend, and the individual components of the index.
The non-transitory computer-readable medium of claim 10 , wherein said user preferences comprise a list of pre-scheduled security-related programs selected by the subscriber. The non-transitory computer-readable medium of claim 10 , wherein said user preferences comprise a category of incident response security alerts selected by the subscriber.
A method for producing internet security news content for multicasting to subscribers of an internet security news network, comprising: receiving data relating to internet security; and. The method of claim 15 , said producing step comprising recording a forensic analyst reading a script, said script comprising a description of an internet security alert and a location of a software patch associated with said security alert.
The method of claim 16 , said script further comprising a description of computer systems potentially affected by the security alert. USP true CA CAA1 en USB2 en. EPA2 en. CAA1 en. WOA2 en. Pervasive, domain and situational-aware, adaptive, automated, and coordinated analysis and control of enterprise-wide computers, networks, and applications for mitigation of business and operational risks and enhancement of cyber security.
USB1 en. System and method for processing priority transport stream data in real time in a multi-channel broadcast multimedia system. System and method for a schedule shift function in a multi-channel broadcast multimedia system. System and method for providing content stream filtering in a multi-channel broadcast multimedia system. Method and apparatus for providing secure communications for mobile communication devices. Training a security scan classifier to learn an issue preference of a human auditor.
Apparatus and method for diplaying an alert to an individual personal computer user via the user's television connected to a cable television system. System and method for protecting a computing device from computer exploits delivered over a networked environment in a secured communication. Method and system for providing customer controlled notifications in a managed network services system. Pervasive, domain and situational-aware, adaptive, automated, and coordinated big data analysis, contextual learning and predictive control of business and operational risks and security.
WOA3 en. USA1 en. Node-based policy-enforcement across mixed media, mixed-communications modalities and extensible to cloud computing such as SOA. Techniques for integrating external content from advertising services into client applications. Securely enabling access to information over a network across multiple protocols. We use cookies to provide you with a great user experience.
Benefits Products Resources. Benefits Unparalleled visibility into network traffic trends and cybersecurity threats. Unparalleled expertise With over 1, cyber defense professionals, eight security operations centers across the globe, and billion flows on network analyzed each day, you can rest easy knowing that your network is being monitored 24x7 by some of the most informed cybersecurity professionals in the industry.
Products and services Choose the best options for your business. Contact sales for pricing. Network Based Firewalls Cloud-based firewall providing continuous inspection and treatment of internet traffic.
Premises Based Firewalls Keep unwanted traffic out and vital data in with a premises-based firewall, a fully managed solution. Enhanced Cybersecurity Services Helps detect advanced persistent threats using classified indicators from Homeland Security. Previous Next. Resources Learn more about how to defend your network, data, and devices.
0コメント