Interactive security risk management
First Claim
1. A computer implemented method for managing security risk, the method comprising:
- setting a hierarchical relationship between two or more elements comprising an entity;
receiving an indication of a security risk associated with one or more of the elements;
receiving a selection of an element; and
transmitting a description of the security risk as it relates to the element selected, based upon the hierarchical relationship of elements and the indication of the security risk.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention includes computer implemented methods and computer apparatus for managing security risk by setting a hierarchical relationship between two or more elements comprising an entity and receiving an indication of a security risk associated with one or more of the elements. A selection of an element can also be received and a description of the security risk can be transmitted, as it relates to the element selected and based upon the hierarchical relationship of elements and the indication of the security risk. A list of resources associated with the element selected can also be generated. Elements can include, for example, a geographic area delineated according to at least one of: a continent, a national boundary; a political boundary, a facility campus; a floor comprising a facility; and a room comprising a building.
-
Citations
18 Claims
-
1. A computer implemented method for managing security risk, the method comprising:
-
setting a hierarchical relationship between two or more elements comprising an entity;
receiving an indication of a security risk associated with one or more of the elements;
receiving a selection of an element; and
transmitting a description of the security risk as it relates to the element selected, based upon the hierarchical relationship of elements and the indication of the security risk. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer implemented method for managing a security risk associated with a facility, the method comprising:
-
presenting a graphical user interface related to a facility and comprising one or more images of the facility;
displaying security issues related to a geographic region comprising the location of the facility;
indicating one or more proximate threats to the facility; and
displaying a relative location of at least one of;
a public utility dependency;
proximate emergency services, ingress routes, egress routes, and a proximate secure shelter. - View Dependent Claims (12, 13)
-
-
14. A method for managing security risk associated with a facility, the method comprising:
-
inputting an indication identifying a facility;
receiving an indication of one or more security risks associated with the facility;
inputting an indication of a subset of the facility;
receiving information descriptive of the security risks specific to the subset of the facility; and
receiving an image of the subset of the facility.
-
-
15. A computerized system for or managing security risk, the system comprising:
-
a computer server accessible with a system access device via a communications network; and
executable software stored on the server and executable on demand, the software operative with the server to cause the server to;
set a hierarchical relationship between two or more elements comprising an entity;
receive an indication of a security risk associated with one or more of the elements;
receive a selection of an element;
transmit a description of the security risk as it relates to the element selected, based upon the hierarchical relationship of elements and the indication of the security risk.
-
-
16. Computer executable program code residing on a computer-readable medium, the program code comprising instructions for causing the computer to:
-
set a hierarchical relationship between two or more elements comprising an entity;
receive an indication of a security risk associated with one or more of the elements;
receive a selection of an element;
transmit a description of the security risk as it relates to the element selected, based upon the hierarchical relationship of elements and the indication of the security risk.
-
-
17. A computer data signal embodied in a digital data stream comprising data relating to a managing security risk, wherein the computer data signal is operative with a computer for causing the computer to:
-
set a hierarchical relationship between two or more elements comprising an entity;
receive an indication of a security risk associated with one or more of the elements;
receive a selection of an element;
transmit a description of the security risk as it relates to the element selected, based upon the hierarchical relationship of elements and the indication of the security risk. - View Dependent Claims (18)
-
Specification