System, Method and Apparatus for Assessing a Risk of One or More Assets Within an Operational Technology Infrastructure
First Claim
1. A computerized method for assessing a risk of one or more assets within an operational technology infrastructure comprising the steps of:
- providing a database containing data relating to the one or more assets;
calculating a threat score for the one or more assets using one or more processors communicably coupled to the database;
calculating a vulnerability score for the one or more assets using the one or more processors;
calculating an impact score for the one or more assets using the one or more processors; and
determining the risk of the one or more assets based on the threat score, the vulnerability score and the impact score using the one or more processors.
1 Assignment
0 Petitions
Accused Products
Abstract
A system, method and apparatus assesses a risk of one or more assets within an operational technology infrastructure by providing a database containing data relating to the one or more assets, calculating a threat score for the one or more assets using one or more processors communicably coupled to the database, calculating a vulnerability score for the one or more assets using the one or more processors, calculating an impact score for the one or more assets using the one or more processors, and determining the risk of the one or more assets based on the threat score, the vulnerability score and the impact score using the one or more processors.
-
Citations
49 Claims
-
1. A computerized method for assessing a risk of one or more assets within an operational technology infrastructure comprising the steps of:
-
providing a database containing data relating to the one or more assets; calculating a threat score for the one or more assets using one or more processors communicably coupled to the database; calculating a vulnerability score for the one or more assets using the one or more processors; calculating an impact score for the one or more assets using the one or more processors; and determining the risk of the one or more assets based on the threat score, the vulnerability score and the impact score using the one or more processors. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program embodied on a non-transitory computer readable medium for assessing a risk of one or more assets within an operational technology infrastructure comprising:
-
a code segment for calculating a threat score for the one or more assets; a code segment for calculating a vulnerability score for the one or more assets; a code segment for calculating an impact score for the one or more assets; and a code segment for determining the risk of the one or more assets based on the threat score, the vulnerability score and the impact score.
-
-
18. An apparatus for assessing a risk of one or more assets within an operational technology infrastructure comprising:
-
a database containing data relating to the one or more assets; and one or more processors communicably coupled to the database, wherein the one or more processors calculate a threat score for the one or more assets, calculate a vulnerability score for the one or more assets, calculate an impact score for the one or more assets, and determine the risk of the one or more assets based on the threat score, the vulnerability score and the impact score. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A system for assessing a risk of one or more assets within an operational technology infrastructure comprising:
-
a risk assessment subsystem that calculates a threat score for the one or more assets, calculates a vulnerability score for the one or more assets, calculates an impact score for the one or more assets, and determines the risk of the one or more assets based on the threat score, the vulnerability score and the impact score; a risk visualization subsystem; a risk mitigation subsystem; and a controller communicably coupled to the risk assessment subsystem, the risk visualization subsystem and the risk mitigation subsystem. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49)
-
Specification