University of Strathclyde (20240236148). Cyber Security Deception System simplified abstract
Contents
Cyber Security Deception System
Organization Name
Inventor(s)
Xavier Bellekens of Glasgow (GB)
Christos Tachtatzis of Glasgow (GB)
Robert Atkinson of Glasgow (GB)
Ivan Andonovic of Glasgow (GB)
Cyber Security Deception System - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240236148 titled 'Cyber Security Deception System
The abstract describes a cyber security system designed to protect a networked system by deploying an interactive deception framework to interact with unauthorized entities accessing the networked system.
- The cyber security system is implemented on a computer service within or in communication with the networked system.
- The interactive deception framework provides artificial components of the networked system to interact with unauthorized entities.
- The security component dynamically adapts or selects artificial components based on the interaction with the unauthorized entity and/or the characterization of the unauthorized entity.
Potential Applications: - Network security for businesses and organizations - Protection of sensitive data and information - Defense against cyber attacks and unauthorized access
Problems Solved: - Unauthorized access to networked systems - Cyber security threats and breaches - Deception of malicious entities
Benefits: - Enhanced network security - Real-time threat detection - Adaptive defense mechanisms
Commercial Applications: - Cyber security software development - Network security consulting services - Data protection solutions for businesses
Questions about the technology: 1. How does the interactive deception framework differentiate between authorized and unauthorized entities? 2. What measures are in place to ensure the artificial components provided to unauthorized entities do not compromise the networked system's security?
Frequently Updated Research: - Ongoing advancements in cyber security technologies - Research on deception techniques in network security
By focusing on the innovative interactive deception framework, this cyber security system offers a proactive approach to defending against unauthorized access and cyber threats.
Original Abstract Submitted
a cyber security system for protecting a networked system, the cyber security system being implemented on a computer service comprised in or provided in communication with the networked system, the cyber security system being configured to deploy an interactive deception framework configured to interact with an unauthorized entity that has accessed the networked system; the interactive deception being configured to interact with the unauthorized entity by providing artificial components of the networked system; and wherein the security component is configured to dynamically adapt or select the artificial components based on the interaction with the unauthorized entity and/or a characterization of the unauthorized entity.