×

Building risk analysis system with dynamic modification of asset-threat weights

  • US 10,559,180 B2
  • Filed: 09/26/2018
  • Issued: 02/11/2020
  • Est. Priority Date: 09/27/2017
  • Status: Active Grant
First Claim
Patent Images

1. A building management system comprising:

  • one or more computer-readable storage media having;

    a data structure, wherein the data structure comprises a plurality of vulnerabilities and a plurality of pairs, each of the plurality of pairs comprising one of a plurality of assets and one of a plurality of threat types, wherein each of the plurality of pairs is associated with one of the plurality of vulnerabilities; and

    instructions stored thereon that, when executed by one or more processors, cause the one or more processors to;

    receive a threat, the threat comprising a particular threat type of the plurality of threat types, the threat indicating an incident affecting a risk value associated with a particular asset of the plurality of assets;

    identify a particular vulnerability of the data structure based on the particular threat type and the particular asset;

    determine, based on the particular vulnerability and the threat, the risk value associated with the particular asset;

    receive, via a user interface, an update to the particular vulnerability associated with the particular asset and the particular threat type;

    update the data structure with the update to the particular vulnerability;

    generate, for the particular asset, a list of threat types that the particular asset is vulnerable to based on the data structure, wherein the list of threat types are threat types that affect a risk score of the particular asset;

    cause the user interface to display the list;

    receive, via the user interface, an update to the list, the update to the list comprising an indication to add one or more new threat types, wherein the data structure does not indicate that the risk score of the particular asset is affected by the one or more new threat types; and

    update the plurality of vulnerabilities of the data structure based on the update to the list by adding one or more vulnerabilities based on the indication to add the one or more new threat types of the list.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×