×

Information security policy evaluation system and method of controlling the same

  • US 20050076243A1
  • Filed: 04/02/2004
  • Published: 04/07/2005
  • Est. Priority Date: 10/01/2003
  • Status: Active Grant
First Claim
Patent Images

1. An information security policy evaluation system comprising:

  • a first information processing apparatus located on a first site;

    a second information processing apparatus located on a second site; and

    a third information processing apparatus located on a third site, the first through the third information processing apparatuses being capable of communicating with each other, wherein the second information processing apparatus has a treated threat data storage section for storing treated threat data, the treated threat data being data indicating a threat which an information security policy operated on the second site can counter, the third information processing apparatus has a threat data storage section for storing threat data which is data indicating a threat having occurred in a past, the second information processing apparatus has a treated threat data transmission section for transmitting the treated threat data to the first information processing apparatus, the third information processing apparatus has a threat data transmission section for transmitting the threat data to the first information processing apparatus, the first information processing apparatus has a treated threat data reception section for receiving the treated threat data and a threat data reception section for receiving the threat data, the first information processing apparatus has a correspondence data storage section for storing correspondence data which is data indicating correspondence between the threat data and the treated threat data, and the first information processing apparatus has an effective treated threat data extraction section for extracting a piece of treated threat data to which there is a piece of threat data corresponding in the threat data received by the threat data reception section, out of the treated threat data received by the treated threat data reception section, based on the correspondence data, and an evaluation data generation section for generating evaluation data in which the extracted treated threat data is described.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×