09
Cyber security systems comprising computer hardware and
software for network-wide detecting, preventing, blocking,
mitigating and fighting harmful consequences of cyber
information and attacks on computer controlled enterprises,
organizations, infrastructures installations and networks,
devising response solutions, handling a stream of alerts,
ensuring consistent performance by teams, linking and
learning previous incidents, managing multiple incidents,
managing cross-organization and continuous cyber-attacks,
ensuring privacy control, providing access to past incidents
and events, facilitating wider cyber intelligence and
analysis and providing advanced cyber security, defense,
response and attack; cyber collection systems comprising
hardware and software for collecting and intercepting
communications and information, namely, web pages, text,
video, voice and data; intelligence computer hardware and
software for detecting voice, video, email, message, media
interaction and text, using access to worldwide web,
intranet, wireless network, and other multimedia
communication transmitted over telecommunication equipment
and networks; computerized hardware and software used to
capture video, voice, data, text, signal and alarm; computer
software for data management, analysis, interpretation,
identification, reporting, and decision support;
telecommunication surveillance hardware and software for
interception, filtering and analyzing data and voice
communications; telecommunication surveillance hardware and
software for interception, filtering and analyzing
communications on networks, mobile applications, chat
applications and webmail services; integrated and modular
cyber security systems for the protection of national
infrastructures and enterprises, property and individuals
from cyber threats including terrorism, crime, fraud, and
theft, comprising computer software and hardware for cyber
security situation management enabling situation planning,
mitigation, response and handling; computer software for
investigating and analyzing potential cyber security
threats; training and simulation software for training cyber
professionals against advanced cyber-attacks
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen