×

Model framework and system for cyber security services

  • US 10,003,598 B2
  • Filed: 04/15/2016
  • Issued: 06/19/2018
  • Est. Priority Date: 04/15/2016
  • Status: Active Grant
First Claim
Patent Images

1. A model framework and system for cyber security services, the system comprising:

  • at least one non-transitory storage device;

    at least one processor; and

    at least one module stored in said storage device and comprising instruction code that is executable by the at least one processor and configured to cause said at least one processor to;

    electronically receive, via a distributed network of servers, information associated with an internal computing device within a network;

    determine one or more access paths to the internal computing device from an external computing device;

    determine one or more controls associated with each of the one or more access paths associated with the internal computing device, wherein the one or more controls are configured to determine access to the internal computing device;

    determine one or more types of access that may be made via one or more of the access paths by the external computing device to access the internal computing device;

    determine that the one or more controls associated with the at least one of the one or more access paths is not capable of detecting the access by the external computing device via at least one of the one or more types of access, wherein determining further comprises determining that the one or more controls is not capable of regulating one or more conditions associated with the one or more types of access;

    determine one or more capabilities associated with the one or more types of access, the one or more types of access incapable of being regulated by the one or more controls;

    identify one or more tools based on at least the one or more determined capabilities, wherein the one or more identified tools facilitate a regulation of the one or more controls to detect and prohibit access to the internal computing device via at least one of the one or more types of access; and

    incorporate the one or more identified tools within the network to regulate the one or more controls to detect and monitor the accessing of the internal computing device by the external computing device via at least one of the one or more types of access previously not capable of detecting the access.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×