SECURITY RISK EVALUATION METHOD FOR EFFECTIVE THREAT MANAGEMENT
First Claim
1. A security risk evaluation method for a threat management environment of a target network, the security risk evaluation method comprising the steps of:
- (a) collecting new threats or vulnerabilities for the network and storing them into a database;
(b) assessing whether assets related to the new threats or vulnerabilities are present in the network or not;
(c) assessing whether or not to apply attack-attempt detection rules related to the assets;
(d) assessing whether or not to apply vulnerability assessment rules related to the assets;
(e) adding omitted vulnerabilities, attack-attempt detection rules and vulnerability assessment rules based on the assessment results of steps (c) and (d); and
(f) calculating security risks based on the assessment results.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided is a security risk evaluation method for threat management. According to the present invention, new threats or vulnerabilities for a network which should be protected (target network) are collected, and a threat management environment is assessed by checking whether or not to apply attack-attempt detection rules and vulnerability assessment rules for assets related to the threats or vulnerabilities. Based on the assessment result, the range and level of response are previously checked and complemented, and corresponding risk evaluation is provided. Therefore, the threat management environment can be managed effectively.
31 Citations
6 Claims
-
1. A security risk evaluation method for a threat management environment of a target network, the security risk evaluation method comprising the steps of:
-
(a) collecting new threats or vulnerabilities for the network and storing them into a database; (b) assessing whether assets related to the new threats or vulnerabilities are present in the network or not; (c) assessing whether or not to apply attack-attempt detection rules related to the assets; (d) assessing whether or not to apply vulnerability assessment rules related to the assets; (e) adding omitted vulnerabilities, attack-attempt detection rules and vulnerability assessment rules based on the assessment results of steps (c) and (d); and (f) calculating security risks based on the assessment results. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification