Systems and Methods for Vulnerability Detection and Scoring with Threat Assessment
First Claim
Patent Images
1. A system for vulnerability detection and scoring with threat assessment, the system including:
- an analysis engine adapted to perform at least one of automated and semi-automated analysis of a computing system of at least one of known threats, vulnerabilities, and risk factors, wherein the analysis engine is further adapted to determine a security score for the computing system based on the analysis and a schedule indicating a severity level for each threat, vulnerability, and risk factor.
0 Assignments
0 Petitions
Accused Products
Abstract
Certain embodiments of the present invention provide a system for vulnerability detection and scoring with threat assessment including an analysis engine adapted to perform at least one of automated and semi-automated analysis of a computing system of at least one of known threats, vulnerabilities, and risk factors. The analysis engine is further adapted to determine a security score for the computing system based on the analysis and a schedule indicating a severity level for each threat, vulnerability, and risk factor.
-
Citations
20 Claims
-
1. A system for vulnerability detection and scoring with threat assessment, the system including:
an analysis engine adapted to perform at least one of automated and semi-automated analysis of a computing system of at least one of known threats, vulnerabilities, and risk factors, wherein the analysis engine is further adapted to determine a security score for the computing system based on the analysis and a schedule indicating a severity level for each threat, vulnerability, and risk factor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
11. A system for vulnerability detection and scoring with threat assessment, the system including:
-
a set of assessment rules, wherein the assessment rules include a schedule indicating a severity level for each threat, vulnerability, and risk factor; and an analysis engine adapted to perform a risk assessment of a computing system to determine a security score for a computing system based at least in part on the set of assessment rules. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer-readable medium including a set of instructions for execution on a computer, the set of instructions including:
-
a risk assessment routine configured to analyze a computing system to evaluate one or more known threats, vulnerabilities, and risk factors; a security score determination routine configured to determine a security score for the computing system based on the results of the analysis; and a user interface routine configured to present the security score to a user.
-
Specification