Inferential analysis using feedback for extracting and combining cyber risk information
First Claim
Patent Images
1. A method, comprising:
- assessing risk of a cyber security failure in a computer network of an entity, using a computer agent configured to collect information from at least one accessible Internet elements, wherein the collection of information occurs periodically or continually over time, wherein the assessing of risk comprises;
determining circumstantial or indirect information that is indicative of the entity based at least in part on the collected information;
confirming or inferring that the entity is referenced in the circumstantial or indirect information that is indicative of the entity being referenced in the circumstantial or indirect information; and
increasing or decreasing the assessed risk if the circumstantial or indirect information indicative of the entity is respectively negative or positive;
automatically determining, based at least in part on the assessed risk, a change or a setting to at least one element of policy criteria of a cyber security policy;
automatically recommending, based at least in part on the assessed risk, computer network changes to reduce the assessed risk;
periodically re-assessing the risk of a cyber security failure in the computer network of the entity, wherein the periodical re-assessing of the risk results in;
an update to the change or setting to the at least one element of policy criteria of the cyber security policy, an update to the computer network changes, or both; and
predicting an action of the entity based at least in part on the periodic re-assessing.
0 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments of the present technology include methods of assessing risk of a cyber security failure in a computer network of an entity. Some embodiments involve using continual or periodic data collecting to improve inferential analysis, as well as obtaining circumstantial or inferential information from social networks. Machine learning may be used to improve predicitive capabilities. Some embodiments allow for identification of an entity from circumstantial or inferential information based on the machine learning and comparative analyses.
121 Citations
15 Claims
-
1. A method, comprising:
-
assessing risk of a cyber security failure in a computer network of an entity, using a computer agent configured to collect information from at least one accessible Internet elements, wherein the collection of information occurs periodically or continually over time, wherein the assessing of risk comprises; determining circumstantial or indirect information that is indicative of the entity based at least in part on the collected information; confirming or inferring that the entity is referenced in the circumstantial or indirect information that is indicative of the entity being referenced in the circumstantial or indirect information; and increasing or decreasing the assessed risk if the circumstantial or indirect information indicative of the entity is respectively negative or positive; automatically determining, based at least in part on the assessed risk, a change or a setting to at least one element of policy criteria of a cyber security policy; automatically recommending, based at least in part on the assessed risk, computer network changes to reduce the assessed risk; periodically re-assessing the risk of a cyber security failure in the computer network of the entity, wherein the periodical re-assessing of the risk results in;
an update to the change or setting to the at least one element of policy criteria of the cyber security policy, an update to the computer network changes, or both; andpredicting an action of the entity based at least in part on the periodic re-assessing. - View Dependent Claims (2, 3, 4, 6, 11, 12, 13)
-
-
5. A method, comprising:
-
assessing risk of a cyber security failure in a computer network of an entity, using a computer agent configured to collect information from at least one accessible Internet elements, wherein the collection of information occurs periodically or continually over time, wherein the assessing of risk comprises; determining circumstantial or indirect information that is indicative of the entity based at least in part on the collected information; confirming or inferring that the entity is referenced in the circumstantial or indirect information that is indicative of the entity being referenced in the circumstantial or indirect information; and increasing or decreasing the assessed risk if the circumstantial or indirect information indicative of the entity is respectively negative or positive; automatically determining, based at least in part on the assessed risk, a change or a setting to at least one element of policy criteria of a cyber security policy; and automatically recommending, based at least in part on the assessed risk, computer network changes to reduce the assessed risk; based at least in part on the assessing of risk of the cyber security failure in the computer network of the entity, plotting one or more features of the entity and other members of a peer group of the entity, the plotting being configured to visually illustrate the risk of a cyber security failure in the computer network of the entity; and the automatic recommending of computer network changes being based at least in part on the plotting.
-
-
7. A method, comprising:
-
assessing risk of a cyber security failure in a computer network of an entity, using a computer agent configured to collect information from at least one accessible Internet elements, wherein the collection of information occurs periodically or continually over time, wherein the assessing of risk comprises; determining circumstantial or indirect information that is indicative of the entity based at least in part on the collected information; confirming or inferring that the entity is referenced in the circumstantial or indirect information that is indicative of the entity being referenced in the circumstantial or indirect information; increasing or decreasing the assessed risk if the circumstantial or indirect information indicative of the entity is respectively negative or positive; assessing, using a plurality of sophistication elements for the entity, a sophistication for the entity with respect to preventing the cyber security failure, the sophistication being one of a plurality of features of the entity; assessing, using a plurality of motivation elements regarding the entity, a motivation of an actor to initiate the cyber security failure, the motivation being another one of the plurality of features of the entity; and calculating a composite score from a motivation score and a sophistication score, the motivation score representing the plurality of motivation elements, the sophistication score representing the plurality of sophistication elements; automatically determining, based at least in part on the assessed risk, a change or a setting to at least one element of policy criteria of a cyber security policy; and automatically recommending, based at least in part on the assessed risk, computer network changes to reduce the assessed risk. - View Dependent Claims (9, 10)
-
-
8. A method, comprising:
-
assessing risk of a cyber security failure in a computer network of an entity, using a computer agent configured to collect information from at least one accessible Internet elements, wherein the collection of information occurs periodically or continually over time, wherein the assessing of risk comprises; determining circumstantial or indirect information that is indicative of the entity based at least in part on the collected information; confirming or inferring that the entity is referenced in the circumstantial or indirect information that is indicative of the entity being referenced in the circumstantial or indirect information; increasing or decreasing the assessed risk if the circumstantial or indirect information indicative of the entity is respectively negative or positive; assessing, using a plurality of sophistication elements for the entity, a sophistication for the entity with respect to preventing the cyber security failure, the sophistication being one of a plurality of features of the entity; and assessing, using a plurality of motivation elements regarding the entity, a motivation of an actor to initiate the cyber security failure, the motivation being another one of the plurality of features of the entity; calculating a composite score based at least in part on the assessing of the risk; calculating a motivation score from the composite score, the motivation score representing the plurality of motivation elements; and calculating a sophistication score from the composite score, the sophistication score representing the plurality of sophistication elements.
-
-
14. A system, comprising:
-
one or more processors configured to; assess risk of a cyber security failure in a computer network of an entity, using a computer agent configured to collect information from at least one accessible Internet elements, wherein the collection of information occurs periodically or continually over time, wherein the assessing of risk comprises; determine circumstantial or indirect information that is indicative of the entity based at least in part on the collected information; confirm or inferring that the entity is referenced in the circumstantial or indirect information that is indicative of the entity being referenced in the circumstantial or indirect information; and increase or decreasing the assessed risk if the circumstantial or indirect information indicative of the entity is respectively negative or positive; automatically determine, based at least in part on the assessed risk, a change or a setting to at least one element of policy criteria of a cyber security policy; and automatically recommend, based at least in part on the assessed risk, computer network changes to reduce the assessed risk; periodically re-assess the risk of a cyber security failure in the computer network of the entity, wherein the periodical re-assessing of the risk results in;
an update to the change or setting to the at least one element of policy criteria of the cyber security policy, an update to the computer network changes, or both; andpredict an action of the entity based at least in part on the periodic re-assessing and one or more memories coupled to the one or more processors, configured to provide the one or more processors with instructions.
-
-
15. A computer program product embodied in a tangible, non-transitory computer readable storage medium and comprising computer instructions for:
-
assessing risk of a cyber security failure in a computer network of an entity, using a computer agent configured to collect information from at least one accessible Internet elements, wherein the collection of information occurs periodically or continually over time, wherein the assessing of risk comprises; determining circumstantial or indirect information that is indicative of the entity based at least in part on the collected information; confirming or inferring that the entity is referenced in the circumstantial or indirect information that is indicative of the entity being referenced in the circumstantial or indirect information; and increasing or decreasing the assessed risk if the circumstantial or indirect information indicative of the entity is respectively negative or positive; automatically determining, based at least in part on the assessed risk, a change or a setting to at least one element of policy criteria of a cyber security policy; automatically recommending, based at least in part on the assessed risk, computer network changes to reduce the assessed risk; periodically re-assessing the risk of a cyber security failure in the computer network of the entity, wherein the periodical re-assessing of the risk results in;
an update to the change or setting to the at least one element of policy criteria of the cyber security policy, an update to the computer network changes, or both; andpredicting an action of the entity based at least in part on the periodic re-assessing.
-
Specification