PL442247A1 - Czujnik zagrożenia cybernetycznego informujący o przełamaniu systemów informatycznych - Google Patents
Czujnik zagrożenia cybernetycznego informujący o przełamaniu systemów informatycznychInfo
- Publication number
- PL442247A1 PL442247A1 PL442247A PL44224722A PL442247A1 PL 442247 A1 PL442247 A1 PL 442247A1 PL 442247 A PL442247 A PL 442247A PL 44224722 A PL44224722 A PL 44224722A PL 442247 A1 PL442247 A1 PL 442247A1
- Authority
- PL
- Poland
- Prior art keywords
- breach
- systems
- power supply
- cyber threat
- threat sensor
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Communication Control (AREA)
- Alarm Systems (AREA)
Abstract
Czujnik zagrożenia cybernetycznego informujący o przełamaniu systemów informatycznych charakteryzuje się tym, że składa się z elementu sieciowo-zasilającego (1) odpowiadającego za zasilanie oraz za komunikację sieciową, w ramach której przekazywane są dane do układu analityczno-sterującego (3), przy czym w przypadku problemów z układem zasilania (1) wykorzystywana jest bateria układu podtrzymania zasilania (2), zaś dane przekazane do układu analityczno-sterującego (3) są analizowane i zapisywane w dostępnym obszarze przestrzeni dyskowej (4).
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PL442247A PL442247A1 (pl) | 2022-09-12 | 2022-09-12 | Czujnik zagrożenia cybernetycznego informujący o przełamaniu systemów informatycznych |
EP22196437.2A EP4336778A1 (en) | 2022-09-12 | 2022-09-19 | Cyber threat sensor informing about the breakdown of information systems |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PL442247A PL442247A1 (pl) | 2022-09-12 | 2022-09-12 | Czujnik zagrożenia cybernetycznego informujący o przełamaniu systemów informatycznych |
Publications (1)
Publication Number | Publication Date |
---|---|
PL442247A1 true PL442247A1 (pl) | 2024-03-18 |
Family
ID=84330895
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PL442247A PL442247A1 (pl) | 2022-09-12 | 2022-09-12 | Czujnik zagrożenia cybernetycznego informujący o przełamaniu systemów informatycznych |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP4336778A1 (pl) |
PL (1) | PL442247A1 (pl) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130113928A1 (en) * | 2011-11-08 | 2013-05-09 | Joseph Feldman | Computerized System and Method for Monitoring a Door of a Facility from Afar |
US9240997B1 (en) * | 2013-09-25 | 2016-01-19 | Sprint Communications Company L.P. | Security for a power over ethernet installation |
US10382215B2 (en) * | 2015-12-22 | 2019-08-13 | Forescout Technologies, Inc. | Device identification and policy enforcement using power over ethernet (POE) |
CN114727062A (zh) * | 2022-03-28 | 2022-07-08 | 慧之安信息技术股份有限公司 | 基于普通安防视频监控的穿透检测方法和装置 |
-
2022
- 2022-09-12 PL PL442247A patent/PL442247A1/pl unknown
- 2022-09-19 EP EP22196437.2A patent/EP4336778A1/en active Pending
Also Published As
Publication number | Publication date |
---|---|
EP4336778A1 (en) | 2024-03-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rinnan et al. | Climate‐niche factor analysis: a spatial approach to quantifying species vulnerability to climate change | |
MX2021011639A (es) | Sistemas de control de acceso fisico con deteccion de intension con base en ubicacion. | |
Post et al. | Spatial synchrony of local populations has increased in association with the recent Northern Hemisphere climate trend | |
Clark | The UK occupational pension system in crisis | |
Harris et al. | To Be Or Not to Be? Variable selection can change the projected fate of a threatened species under future climate | |
GB2548172A (en) | Personal Life Manager (PLM) system and method | |
London et al. | Incidence matrix approach for calculating readiness levels | |
PL442247A1 (pl) | Czujnik zagrożenia cybernetycznego informujący o przełamaniu systemów informatycznych | |
Fang et al. | Cooperative guidance laws with constraints on impact time and terminal angle | |
Kang et al. | Analyzing Disaster Response Terminologies by Text Mining and Social Network Analysis | |
TW200720941A (en) | Host computer memory configuration data remote access method and system | |
Scanlan et al. | Extreme environments robotics: Robotics for emergency response, disaster relief and resilience | |
Marti | Continuous‐Time Control under Stochastic Uncertainty | |
Puchkova et al. | Closed‐form solutions of a fishery harvesting model with state constraint | |
Shortridge et al. | Characterization of temporal and cross-sectional variability in water consumption based on monthly withdrawal and discharge data | |
Fattore | Partially Ordered Sets | |
Jagers | Branching processes | |
Jang et al. | A Study on PC Based Information System for Securing Availability of University's School Affairs | |
Dinsley et al. | The Governance of Space Situational Awareness-Revolution not Evolution | |
Forni | The input-to-state stability framework for multistable systems on manifolds | |
KR101450250B1 (ko) | 스마트기기 입체적 정책 적용 방법 및 장치 | |
Alfieri et al. | Improving operational flood risk reduction with the Global Flood Partnership | |
Aubry et al. | Semantics, Properties and Evolution Rules of an SPN | |
Ranagalage | Tsunami vulnerability assessment in the western coastal belt in Sri Lanka | |
Henriques et al. | Delivering sustainable river basin management: plausible future scenarios for the water environment to 2030 & 2050. Report C: Implications |