THREAT EVALUATION SYSTEM AND METHOD
First Claim
1. A system for evaluating one or more probability for at least one threat to a client application that is communicably coupled to said system comprising:
- a cyber reference library;
an opponent catalog; and
a network model,wherein said system produces a set of analyst reports providing a calculation of the results of said evaluation of said at least one threat to said client application.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods of evaluation of threats to elements of a client computer application having a cyber reference library, an opponent catalog and a network model. The systems and methods produce a set of analyst reports evaluating the threats to the client computer application. One embodiment of the system for evaluating at least one threat to a client computer application has a threat evaluation engine which performs a plurality of algorithms, where each algorithm of has implementation specific needs for input into the individual algorithm, a threat evaluation results data store, a statistical analysis engine, and an analysis results data store.
146 Citations
39 Claims
-
1. A system for evaluating one or more probability for at least one threat to a client application that is communicably coupled to said system comprising:
-
a cyber reference library; an opponent catalog; and a network model, wherein said system produces a set of analyst reports providing a calculation of the results of said evaluation of said at least one threat to said client application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. A system for evaluating the probabilities of at least one threat to a client application that is communicably coupled to said system comprising:
-
a threat evaluation engine which performs a plurality of algorithms, wherein each said algorithm of the plurality of algorithms having implementation specific needs for input into said individual algorithm; a threat evaluation results data store; a statistical analysis engine; a network models data store; and an analysis results data store.
-
-
39. A non-transitory computer-readable medium having computer-executable instructions that when executed, causes one or more processors to perform a method for evaluating at least one threat to a client computer application, the method comprising:
-
accessing an opponent catalog that contains at least one set of actors comprising a plurality of possible threats, wherein said possible threats are mechanisms used to gain unauthorized access to said client computer application; accessing a cyber reference library, wherein said cyber library maintains at least one service characterization describing the possible approaches a user has available to access a service on a network and analyzing the likelihood of success by said user to access said service; accessing a network model capable of representing how said user might gain unauthorized access to said client computer application; providing a plurality of data sets resulting from access and analysis steps to a threat evaluation engine, wherein said threat evaluation engine performs a plurality of algorithms, wherein each said algorithm of the plurality of algorithms having implementation specific needs for input into said individual algorithm; and producing a set of analyst reports providing a calculation of the results of said evaluation of said at least one threat to said client application.
-
Specification