Anti-tamper process toolset
First Claim
1. A programmable computer useable medium having computer readable code embodied in said medium operable to cause said computer to process data records comprising information concerning risk, threat vulnerability, impact and security attack, said medium being further being operable to cause said computer to apply an algorithm to said data records to rate time-factored risks and select appropriate countermeasures and technical implementations therefor against said time-factored risks.
1 Assignment
0 Petitions
Accused Products
Abstract
A tool set is provided that uses a series of modules (e.g. spreadsheet workbooks) for assessing risks/threats to and attacks against a project and developing countermeasures against such risks/threats/attacks. The project may cover a wide berth of functionality from alarm systems, computer security, building projects, etc. The roll up feature of the spreadsheet may be employed to evaluate changing scenarios in a short period of time. Ranked threats and countermeasures operable to defeat such threats may be displayed in a tree diagram generated by one or more of the modules.
18 Citations
24 Claims
- 1. A programmable computer useable medium having computer readable code embodied in said medium operable to cause said computer to process data records comprising information concerning risk, threat vulnerability, impact and security attack, said medium being further being operable to cause said computer to apply an algorithm to said data records to rate time-factored risks and select appropriate countermeasures and technical implementations therefor against said time-factored risks.
- 8. A programmable computer useable medium wherein said plurality of workbooks is selected from workbooks consisting of a critical program information workbook, a work breakdown structure critical program information workbook, an asset identification and valuation workbook, a threat and vulnerability workbook, an attack workbook, a risk workbook, a countermeasures workbook, a concepts selection workbook, an implementation parameters workbook, a health status workbook and a combination thereof.
-
9. A method of generating a tamper tree diagram comprising:
-
assigning hierarchical indices to individual data elements for computer data records; combining hierarchical indices for each data element in a computer data record into a single unique and sortable composite record index; sorting composite record indices; extracting individual hierarchical indices from sorted composite record indices; determining a hierarchical attack tree structure from extracted individual hierarchical indices; and replacing hierarchical indices with actual associated data elements.
-
-
10. A system for evaluating possible countermeasures against elements of a project comprising:
-
the project; a programmable computer useable medium operable to cause said computer to process data records concerning risk, threat, vulnerability impact and security attack, said medium being further operable to cause said computer to apply an algorithm to said data records to rate time-factored risks and select appropriate countermeasures and technical implementations therefor against said time-factored risks, said medium being programmed to cause said computer to generate a tamper tree diagram by assigning hierarchical indices to individual data elements for computer data records; combining hierarchical indices for each data element in a computer data record into a single unique and sortable composite record index; sorting composite record indices; extracting individual hierarchical indices from sorted composite record indices; determining a hierarchical attack tree structure from extracted individual hierarchical indices; and replacing hierarchical indices with actual associated data elements.
-
Specification