Automated security management
First Claim
1. A computer-implemented method for managing risk related to a security risk event, the method comprising:
- receiving information relating to a security risk event;
structuring the information received according to risk variables; and
calculating a security level using the structured information and a set of relationships established between the risk variables.
2 Assignments
0 Petitions
Accused Products
Abstract
A computerized method and system for managing security risk, where risk associated with a breach of security is analyzed and quantified according to weighted risk variables. The analysis is accomplished by a computerized security risk management system that receives information relating to physical, informational, communication and surveillance risk, and structures the information such that it can be related to risk variables and a security risk level can be calculated according to a relevance of associated risk variables. The security risk level can be indicative of a likelihood that a breach of security may occur relating to a particular transaction or facility. Similarly, a security confidence level can be indicative of how secure a particular facility or practice is and a security maintenance level can be indicative of a level of security that should be maintained in relation to an analyzed subject.
131 Citations
28 Claims
-
1. A computer-implemented method for managing risk related to a security risk event, the method comprising:
-
receiving information relating to a security risk event;
structuring the information received according to risk variables; and
calculating a security level using the structured information and a set of relationships established between the risk variables. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A computerized system for managing risk related to a security risk event, the system comprising:
-
a computer server accessible with a system access device via a communications network; and
executable software stored on the server and executable on demand, the software operative with the server to cause the system to;
receive in formation relating to a security risk event;
structure the information received according to risk variables; and
calculate a security level using the structured information and a set of relationships established between the risk variables. - View Dependent Claims (23)
-
-
24. Computer executable program code residing on a computer-readable medium, the program code comprising instructions for causing the computer to:
-
receive information relating to a security risk event;
structure the information received according to risk variables; and
calculate a security level using the structured information and a set of relationships established between the risk variables.
-
-
25. A computer data signal embodied in a digital data stream comprising data relating to risk management, wherein the computer data signal is generated by a method comprising the steps of:
-
receiving information relating to a security risk event;
structuring the information received according to risk variables; and
calculating a security level using the structured information and a set of relationships established between the risk variables.
-
-
26. A method of interacting with a network access device so as to manage risk relating to a risk subject, the method comprising the steps of:
-
initiating interaction with a security risk management server via a communications network;
inputting information descriptive of a security risk event;
transmitting the information descriptive of security risk event to a security risk management server; and
receiving a security level calculated using the information descriptive of a security risk event and a set of relationships established between risk variables associated with the information descriptive of a security risk event. - View Dependent Claims (28)
-
-
27. The method of claim 35 wherein the risk event is a financial transaction.
Specification