Systems and Methods for Sensitive Data Remediation
First Claim
Patent Images
1. A computer network auditing method, comprising:
- deploying agents on respective computers among a plurality of computers throughout a network;
using the agents to collect information about the type of data stored on the respective computers and the programs running on the respective computers;
receiving the information from the agents at a central location;
for each computer for which the information has been received, calculating a risk score, where the risk score is based on the type of data stored on said each computer and a security of said each computer;
comparing, at the central location, calculated risk scores of multiple computers and ranking the multiple computers in a risk score order; and
for a given one of the multiple computers in the risk score order, performing a remediation technique that has the effect of reducing the risk score for the given computer.
12 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for sensitive data remediation include calculating a Probability of Loss of data on a given computer based on measures of control, integrity, and potential avenues of exploitation of the given computer, determining an Impact of Loss of the data on the given computer based on a type, volume, and nature of the data, and correlating the Probability of Loss with the Impact of Loss to generate a risk score for the given computer that can be compared to other computers in the network. The computers with higher risk scores can then be subjected to data remediation activity.
41 Citations
20 Claims
-
1. A computer network auditing method, comprising:
-
deploying agents on respective computers among a plurality of computers throughout a network; using the agents to collect information about the type of data stored on the respective computers and the programs running on the respective computers; receiving the information from the agents at a central location; for each computer for which the information has been received, calculating a risk score, where the risk score is based on the type of data stored on said each computer and a security of said each computer; comparing, at the central location, calculated risk scores of multiple computers and ranking the multiple computers in a risk score order; and for a given one of the multiple computers in the risk score order, performing a remediation technique that has the effect of reducing the risk score for the given computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of increasing security of data on a network, comprising:
-
categorizing data stored on a first computer to obtain categories of data; determining potential avenues of exploitation of the first computer to obtain a list of potential avenues of exploitation; sending to a server computer information including the categories of data and the list of potential avenues of exploitation associated with the first computer; categorizing data stored on a second computer to obtain categories of data; determining potential avenues of exploitation of the second computer to obtain a list of potential avenues of exploitation; sending to the server computer information including the categories of data and the list of potential avenues of exploitation associated with the second computer; generating a risk score for each of the first computer and the second computer, the risk score being based on the respective categories of data and list of potential avenues of exploitation of the first and second computers; causing a given category of data on the first computer to be removed from the first computer in light of the first computer having a higher risk score than the second computer. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method of monitoring a network of computers, comprising;
-
receiving, from respective computers in the network, an indication of the types of information stored thereon; receiving, from the respective computers in the network, an indication of a level of security thereof; receiving, from the respective computers in the network, an indication of configuration of the respective computer; calculating a risk score for each respective computer based on the types of information, security and configuration of each respective computer; and ranking the computers based on their respective risk scores. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A method, comprising:
-
calculating a Probability of Loss of data on a given computer based on measures of control, integrity, and potential avenues of exploitation of the given computer; determining an Impact of Loss of the data on the given computer based on a type, volume, and nature of the data; and correlating the Probability of Loss with the Impact of Loss to generate a risk score for the given computer that can be compared to other computers in the network. - View Dependent Claims (20)
-
Specification