Method and a software system for end-to-end security assessment for security and CIP professionals
First Claim
1. A method for implementing end-to-end security assessment (EESA) for use by Security and CIP professionals for large, complex, critical infrastructure (LCCI) systems, comprsing:
- determining security policy and sensitivity levels of data;
identifying and analyzing critical business-derived information flows for the layers, security mechanisms, formats and communications protocols of the system;
assessing each of said information flows for security gaps;
determining the risk level of each of said information flows by applying a formula that takes into account the threat, its likelihood and its potential impact on the system;
comparing the required defence levels to said security mechanisms, listing all gaps found according to a prioritization process that determines the urgency of closing each gap and creating a detailed list of the prioritized gaps; and
offering specific countermeasures to close each of said gaps, wherein emphasis is put on optimizing said countermeasures.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and software system for Security and CIP Professionals (CIP) that addresses the shortcomings in today'"'"'s Critical Infrastructure Protection (CIP) methods, and offers a new security assessment methodology equipped to meet the present challenges of CIP, as well as future challenges. The method is based on an End-to-End Security Assessment (EESA) that provides a wide examination of system information flows. The method disclosed is for implementing end-to-end security assessment (EESA) for use by Security and CIP professionals for large, complex, critical infrastructure (LCCI) systems. The first step of the method is determining security policy and sensitivity levels of data. Further steps include identifying and analyzing critical business-derived information flows for the layers, security mechanisms, formats and communications protocols of the system; assessing each of said information flows for security gaps; determining the risk level of each of said information flows by applying a formula that takes into account the threat, its likelihood and its potential impact on the system; comparing the required defence levels to said security mechanisms, listing all gaps found according to a prioritization process that determines the urgency of closing each gap and creating a detailed list of the prioritized gaps; and offering specific countermeasures to close each of said gaps, wherein emphasis is put on optimizing said countermeasures.
38 Citations
10 Claims
-
1. A method for implementing end-to-end security assessment (EESA) for use by Security and CIP professionals for large, complex, critical infrastructure (LCCI) systems, comprsing:
-
determining security policy and sensitivity levels of data;
identifying and analyzing critical business-derived information flows for the layers, security mechanisms, formats and communications protocols of the system;
assessing each of said information flows for security gaps;
determining the risk level of each of said information flows by applying a formula that takes into account the threat, its likelihood and its potential impact on the system;
comparing the required defence levels to said security mechanisms, listing all gaps found according to a prioritization process that determines the urgency of closing each gap and creating a detailed list of the prioritized gaps; and
offering specific countermeasures to close each of said gaps, wherein emphasis is put on optimizing said countermeasures. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification