SYSTEMS, METHODS, AND DEVICES FOR IMPROVED CYBERSECURITY
First Claim
1. A method comprising:
- sending a risk assessment template to a user device;
receiving a response to the risk assessment template comprising a list of one or more assets;
determining a score for each of the one or more assets based on the response;
determining a network security policy based on the response and the scores using a network security policy computer knowledge base;
determining a network system design based on the network security policy and the response;
determining at least one hardware element and at least one software element based on the network security policy;
determining commands based on the at least one hardware element, the at least one software element, and the network security policy; and
transmitting, using one or more processors, the commands to a security appliance corresponding to the at least one hardware element, whereby the commands cause the security appliance to execute one or more machine-readable rules and security processes corresponding to the network security policy.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments relate to systems, devices, and computing-implemented methods for initiating a secure network communication system using a response to a risk assessment template and one or more computer knowledge bases to determine a network security policy, network security controls, hardware and software devices, and commands for the hardware and software devices. Embodiments also relate to systems, devices, and computing-implemented methods for monitoring the secure network communication system by monitoring communications from user devices, determining to hold communications based on the network security policy, notifying users of held communications, and allowing the users, via their user devices, to adjust the network security policy for overridable controls to authorize held communications.
-
Citations
26 Claims
-
1. A method comprising:
-
sending a risk assessment template to a user device; receiving a response to the risk assessment template comprising a list of one or more assets; determining a score for each of the one or more assets based on the response; determining a network security policy based on the response and the scores using a network security policy computer knowledge base; determining a network system design based on the network security policy and the response; determining at least one hardware element and at least one software element based on the network security policy; determining commands based on the at least one hardware element, the at least one software element, and the network security policy; and transmitting, using one or more processors, the commands to a security appliance corresponding to the at least one hardware element, whereby the commands cause the security appliance to execute one or more machine-readable rules and security processes corresponding to the network security policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method executed by a security appliance, comprising:
-
receiving commands corresponding to a network security policy; executing the commands to establish one or more network security rules; receiving, from a user device, information corresponding to user device events, wherein the user device comprises an instance of a distributed database; storing the information in a second instance of the distributed database; receiving a communication from the user device; comparing the communication to the one or more network security rules and the information corresponding to the user device events in the second instance of the distributed database; determining to hold the communication based on the comparing; transmitting an indication of a network security event based on determining to hold the communication; receiving a command in response to the transmitting; and executing the command, using one or more processors, wherein the command causes the security appliance to block or allow the communication. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method comprising:
-
receiving an indication of a network security event from a security appliance; comparing the network security event to information in a network security database; determining to notify a user based on the comparing; determining, using one or more processors, a user device to notify based on a user authorization hierarchy and an asset corresponding to the network security event; sending a notification to the user device, wherein the notification causes the user device to display an indication of the network security event and display a selection option on whether to allow or block a communication; receiving a response from the user device; determining commands based on the response; and transmitting the commands to the security appliance. - View Dependent Claims (22, 23, 24, 25, 26)
-
Specification