Systems for network risk assessment including processing of user access rights associated with a network of devices
First Claim
1. A computerized method comprising:
- by a computing device having one or more computer processors and a non-transitory computer readable storage device storing software instruction for execution by the one or more computer processors,determining a network topology of a network, the network topology comprising a plurality of nodes each connected to one or more of the plurality of nodes, wherein each node is associated with one or more network devices;
accessing information indicating compromise values associated with respective nodes; and
providing, for presentation, an interactive user interface, wherein the interactive user interface presents a graphical depiction of the network topology and compromise values associated with the plurality of nodes.
8 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network risk assessment. One of the methods includes obtaining information describing network traffic between a plurality of network devices within a network. A network topology of the network is determined based on the information describing network traffic, with the network topology including nodes connected by an edge to one or more other nodes, and with each node being associated with one or more network devices. Indications of user access rights of users are associated to respective nodes included in the network topology. User interface data associated with the network topology is generated.
183 Citations
20 Claims
-
1. A computerized method comprising:
-
by a computing device having one or more computer processors and a non-transitory computer readable storage device storing software instruction for execution by the one or more computer processors, determining a network topology of a network, the network topology comprising a plurality of nodes each connected to one or more of the plurality of nodes, wherein each node is associated with one or more network devices; accessing information indicating compromise values associated with respective nodes; and providing, for presentation, an interactive user interface, wherein the interactive user interface presents a graphical depiction of the network topology and compromise values associated with the plurality of nodes. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer program product, encoded on one or more non-transitory computer storage media, comprising instructions that when executed by one or more computers cause the one or more computers to perform operations comprising:
-
determining a network topology of a network, the network topology comprising a plurality of nodes each connected to one or more of the plurality of nodes, wherein each node is associated with one or more network devices; accessing information indicating compromise values associated with respective nodes; and providing, for presentation, an interactive user interface, wherein the interactive user interface presents a graphical depiction of the network topology and compromise values associated with the plurality of nodes. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A system comprising one or more computers and non-transitory computer storage media storing instructions that, when executed by the computers, cause the computers to perform operations comprising:
-
determining a network topology of a network, the network topology comprising a plurality of nodes each connected to one or more of the plurality of nodes, wherein each node is associated with one or more network devices; accessing information indicating compromise values associated with respective nodes; and providing, for presentation, an interactive user interface, wherein the interactive user interface presents a graphical depiction of the network topology and compromise values associated with the plurality of nodes. - View Dependent Claims (19, 20)
-
Specification