Unknown Organization (20240320333). Cyber Security System To Prevent Insider Attacks simplified abstract

From WikiPatents
Jump to navigation Jump to search

Cyber Security System To Prevent Insider Attacks

Organization Name

Unknown Organization

Inventor(s)

Timothy William Edgin of Houston TX (US)

Cyber Security System To Prevent Insider Attacks - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240320333 titled 'Cyber Security System To Prevent Insider Attacks

The abstract describes a cyber security system designed to prevent insider attacks by assigning security importance numbers to protected objects and requiring multiple administrators to approve any requested changes.

  • Simplified Explanation:

This patent application describes a cyber security system that assigns security importance numbers to protected objects and requires multiple administrators to approve changes.

  • Key Features and Innovation:

- Assigning security importance numbers to relevant objects - Requiring approval from multiple administrators before implementing changes - Designed to prevent insider attacks

  • Potential Applications:

- Corporate cybersecurity - Government security systems - Financial institutions

  • Problems Solved:

- Preventing insider attacks - Ensuring secure changes to protected objects - Enhancing overall cybersecurity measures

  • Benefits:

- Increased protection against insider threats - Improved security for sensitive information - Enhanced control over changes to protected objects

  • Commercial Applications:

Title: Enhanced Cybersecurity System for Insider Threat Prevention This technology can be applied in various industries such as corporate cybersecurity, government security systems, and financial institutions to prevent insider attacks and enhance overall cybersecurity measures.

  • Questions about Cybersecurity System for Insider Threat Prevention:

1. How does the system assign security importance numbers to protected objects? The system assigns security importance numbers based on the level of importance and sensitivity of the object being protected.

2. What happens if the security importance number threshold is not met for a requested change? If the security importance number threshold is not met, the change will not be implemented until the required number of administrators approve it.


Original Abstract Submitted

a cyber security system mainly designed to prevent insider attacks. a security importance number is assigned to each relevant object that the user wishes to protect. then whenever a change is requested of a particular protected object, a security importance number threshold check is made and n+1 many administrators must approve of the change before the change is implemented.