METHODOLOGIES, TOOLS AND PROCESSES FOR THE ANALYSIS OF INFORMATION ASSURANCE THREATS WITHIN MATERIAL SOURCING AND PROCUREMENT
First Claim
Patent Images
1. A method, comprising:
- obtaining information associated with malware risk to an enterprise system;
providing assurance threat analysis intelligence corresponding to the information by determining relationships between portions of the information; and
generating a visualization of threats to the enterprise system based on the intelligence an the results from performed analytics on the information and the intelligence,wherein the visualization includes a display of one or more reports.
1 Assignment
0 Petitions
Accused Products
Abstract
Enterprise resource planning systems and methods are described. Point sources for at-risk components and technologies in an enterprise are assembled, identified and localized by identifying factors such as geo-political affiliation of parties including employers, employees, organizations, education levels of the parties, capability and abilities to create or modify malware, and the financial level of the per-capita population model-based threat rankings. Threats to a pipeline are determined, ranked, and a targeted risk mitigation prioritization plan against identified high-level threats is created.
9 Citations
18 Claims
-
1. A method, comprising:
-
obtaining information associated with malware risk to an enterprise system; providing assurance threat analysis intelligence corresponding to the information by determining relationships between portions of the information; and generating a visualization of threats to the enterprise system based on the intelligence an the results from performed analytics on the information and the intelligence, wherein the visualization includes a display of one or more reports. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for analyzing security threats in an enterprise, wherein the method is implemented in a computer system comprising one or more processors configured to execute one or more computer program modules, the method comprising:
-
executing, on the one or more processors of the computer system, one or more computer program modules configured to obtain information associated with a malware risk to an enterprise system; executing, on the one or more processors of the computer system, one or more computer program modules configured to provide assurance threat analysis intelligence corresponding to the information by determining relationships between portions of the information; and executing, on the one or more processors of the computer system, one or more computer program modules configured to generate a visualization of threats to the enterprise system based on the intelligence an the results from performed analytics on the information and the intelligence, wherein the visualization includes a display of one or more reports. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification