Cyber vulnerability scan analyses with actionable feedback
First Claim
1. A method, comprising:
- determining an external infrastructure of an entity, the entity being coupled to a network, the external infrastructure comprising one or more cyber assets utilized by the entity;
collecting infrastructure information regarding the one or more cyber assets, wherein the infrastructure information collected includes at least historical patterns for the infrastructure;
performing passive cyber security vulnerability testing on the one or more cyber assets using the collected infrastructure information, wherein the passive cyber security vulnerability testing does not require access to the one or more cyber assets, and wherein the passive cyber security vulnerability testing includes normalizing based on the historical patterns and based on a peer group of the entity;
assessing cyber security vulnerabilities of the one or more cyber assets based on the performing of the passive cyber security vulnerability testing;
calculating an association score for the one or more cyber assets based on the assessed cyber security vulnerabilities; and
automatically recommending to the entity via the network, based on the association score, computer network changes for the one or more cyber assets to reduce the assessed cyber security vulnerabilities.
4 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the present technology relate to cyber attack vulnerability analyses. In one embodiment, a method includes determining an external infrastructure of an entity, the external infrastructure including one or more cyber assets utilized by the entity, collecting infrastructure information regarding the one or more cyber assets, performing passive cyber security vulnerability testing on the one or more cyber assets using the collected infrastructure information, and assessing cyber security vulnerabilities of the one or more cyber assets. The method may further include calculating an association score for the one or more cyber assets based on the assessed cyber security vulnerabilities, and automatically recommending, based on the association score, computer network changes to reduce the cyber security vulnerabilities.
-
Citations
16 Claims
-
1. A method, comprising:
-
determining an external infrastructure of an entity, the entity being coupled to a network, the external infrastructure comprising one or more cyber assets utilized by the entity; collecting infrastructure information regarding the one or more cyber assets, wherein the infrastructure information collected includes at least historical patterns for the infrastructure; performing passive cyber security vulnerability testing on the one or more cyber assets using the collected infrastructure information, wherein the passive cyber security vulnerability testing does not require access to the one or more cyber assets, and wherein the passive cyber security vulnerability testing includes normalizing based on the historical patterns and based on a peer group of the entity; assessing cyber security vulnerabilities of the one or more cyber assets based on the performing of the passive cyber security vulnerability testing; calculating an association score for the one or more cyber assets based on the assessed cyber security vulnerabilities; and automatically recommending to the entity via the network, based on the association score, computer network changes for the one or more cyber assets to reduce the assessed cyber security vulnerabilities. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system, comprising:
-
a processor; and a memory communicatively coupled with the processor, the memory storing instructions which when executed by the processor performs a method, the method comprising; determining an external infrastructure of an entity, the entity being coupled to a network, the external infrastructure comprising one or more cyber assets utilized by the entity; collecting infrastructure information regarding the one or more cyber assets, wherein the infrastructure information collected includes historical patterns for the infrastructure; performing passive cyber security vulnerability testing on the one or more cyber assets using the collected infrastructure information, wherein the passive cyber security vulnerability testing does not require access to the one or more cyber assets, and wherein the passive cyber security vulnerability testing includes normalizing based on the historical patterns and based on a peer group of the entity; assessing cyber security vulnerabilities of the one or more cyber assets based on the performing of the passive cyber security vulnerability testing; calculating an association score for the one or more cyber assets based on the assessed cyber security vulnerabilities; and automatically recommending to the entity via the network, based on the association score, computer network changes for the one or more cyber assets to reduce the assessed cyber security vulnerabilities. - View Dependent Claims (15)
-
-
16. A method, comprising:
-
assessing a plurality of online resources of an entity, the entity being coupled to a network; collecting identifying information for the plurality of online resources wherein the identifying information collected includes at least historical patterns; searching, based on the collected identifying information for the plurality of online resources, for information sources that have exposed sensitive information regarding the plurality of online resources; determining cyber security vulnerabilities using the exposed sensitive information, wherein the determining cyber security vulnerabilities comprises passive cyber security vulnerability testing that does not require access to the plurality of online resources, the passive cyber security vulnerability testing including normalizing based on historical patterns and based on a peer group of the entity, and wherein the determining cyber security vulnerabilities comprises; normalizing based on historical patterns for the plurality of online resources of the entity, and based on tracking against at least one peer group of the entity; and automatically recommending to the entity via the network, based on the cyber security vulnerabilities, computer network changes for the plurality of online resources to reduce the cyber security vulnerabilities.
-
Specification