System and method for evaluating and enhancing the security level of a network system
First Claim
Patent Images
1. A method for evaluating a security level of a network system, the method being implemented by one or more processors and comprising:
- identifying a plurality of security elements of the network system;
determining a security architecture of the network system based on the identified plurality of security elements;
wherein determining the security architecture includes implementing a security model that identifies a plurality of pre-determined relationships as between individual security elements in the plurality of security elements, in connection with possible types of threats to the network system and one or more types of assets that can be exposed as a result of a breach;
evaluating the security architecture to determine an evaluation for the network system, the evaluation identifying a monetary value for a risk to the security network as a result of one or more security elements being breached;
determining a set of recommendations based at least in part on the evaluation, each recommendation in the set of recommendations identifying a new component to add to the security network to improve the evaluation of the security architecture;
wherein determining the set of recommendations includes determining the new component based at least in part on both the cost for implementing the new component on the network system as compared to the monetary value for the breach if the new component is not implemented; and
outputting the evaluation to a user, wherein the output includes the determined set of recommendations.
1 Assignment
0 Petitions
Accused Products
Abstract
Examples described herein provide for a system that evaluates a security level of a network system. Additionally, examples described herein evaluate a security level of a network system in order to enable a determination of components that can be used to enhance the security level of the network system.
-
Citations
18 Claims
-
1. A method for evaluating a security level of a network system, the method being implemented by one or more processors and comprising:
-
identifying a plurality of security elements of the network system; determining a security architecture of the network system based on the identified plurality of security elements; wherein determining the security architecture includes implementing a security model that identifies a plurality of pre-determined relationships as between individual security elements in the plurality of security elements, in connection with possible types of threats to the network system and one or more types of assets that can be exposed as a result of a breach; evaluating the security architecture to determine an evaluation for the network system, the evaluation identifying a monetary value for a risk to the security network as a result of one or more security elements being breached; determining a set of recommendations based at least in part on the evaluation, each recommendation in the set of recommendations identifying a new component to add to the security network to improve the evaluation of the security architecture; wherein determining the set of recommendations includes determining the new component based at least in part on both the cost for implementing the new component on the network system as compared to the monetary value for the breach if the new component is not implemented; and outputting the evaluation to a user, wherein the output includes the determined set of recommendations. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable medium that stores instructions for evaluating the security level of a network system, the instructions being executable by one or more processors to cause the one or more processors to perform operations that include:
-
identifying a plurality of security elements of the network system; determining a security architecture of the network system based on the identified plurality of security elements; wherein determining the security architecture includes implementing a security model that identifies a plurality of pre-determined relationships as between individual security elements in the plurality of security elements, in connection with possible types of threats to the network system and one or more types of assets that can be exposed as a result of a breach; evaluating the security architecture to determine an evaluation for the network system, the evaluation identifying a monetary value for a risk to the security network as a result of one or more security elements being breached; determining a set of recommendations based at least in part on evaluating the security architecture, each recommendation in the set of recommendations identifying a new component to add to the security network to improve the evaluation of the security architecture; wherein determining the set of recommendations includes determining the new component based at least in part on both the cost for implementing the new component on the network system as compared to the monetary value for the breach if the new component is not implemented; and outputting the evaluation to a user, wherein the output includes the determined set of recommendations.
-
-
18. A computer system comprising:
-
a memory that stores a set of instructions; one or more processors that access the instructions in the memory to; identify a plurality of security elements of the network system; determine a security architecture of the network system based on the identified plurality of security elements; wherein the one or more processors determine the security architecture by implementing a security model that identifies a plurality of pre-determined relationships as between individual security elements in the plurality of security elements, in connection with possible types of threats to the network system and one or more types of assets that can be exposed as a result of a breach; evaluate the security architecture to determine an evaluation for the network system, the evaluation identifying a monetary value for a risk to the security network as a result of one or more security elements being breached; determine a set of recommendations based at least in part on evaluating the security architecture, each recommendation in the set of recommendations identifying a new component to add to the security network to improve the evaluation of the security architecture; wherein the one or more processors determine the set of recommendations by determining the new component based at least in part on both the cost for implementing the new component on the network system as compared to the monetary value for the breach if the new component is not implemented; and output the evaluation to a user, wherein the output includes the determined set of recommendations.
-
Specification