Cyber Vulnerability Scan Analyses with Actionable Feedback
First Claim
1. A method, comprising:
- determining an external infrastructure of an entity, the external infrastructure comprising one or more cyber assets utilized by the entity;
collecting infrastructure information regarding the one or more cyber assets;
performing passive cyber security vulnerability testing on the one or more cyber assets using the collected infrastructure information;
assessing cyber security vulnerabilities of the one or more cyber assets based on the performing of passive cyber security vulnerability testing;
calculating an association score for the one or more cyber assets based on the assessed cyber security vulnerabilities; and
automatically recommending, based on the association score, computer network changes for the one or more cyber assets to reduce the assessed cyber security vulnerabilities.
4 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the present technology relate to cyber attack vulnerability analyses. In one embodiment, a method includes determining an external infrastructure of an entity, the external infrastructure including one or more cyber assets utilized by the entity, collecting infrastructure information regarding the one or more cyber assets, performing passive cyber security vulnerability testing on the one or more cyber assets using the collected infrastructure information, assessing cyber security vulnerabilities of the one or more cyber assets, calculating an association score for the one or more cyber assets based on the assessed cyber security vulnerabilities, and automatically recommending, based on the association score, computer network changes to reduce the cyber security vulnerabilities.
79 Citations
21 Claims
-
1. A method, comprising:
-
determining an external infrastructure of an entity, the external infrastructure comprising one or more cyber assets utilized by the entity; collecting infrastructure information regarding the one or more cyber assets; performing passive cyber security vulnerability testing on the one or more cyber assets using the collected infrastructure information; assessing cyber security vulnerabilities of the one or more cyber assets based on the performing of passive cyber security vulnerability testing; calculating an association score for the one or more cyber assets based on the assessed cyber security vulnerabilities; and automatically recommending, based on the association score, computer network changes for the one or more cyber assets to reduce the assessed cyber security vulnerabilities. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system, comprising:
-
a processor; and a memory communicatively coupled with the processor, the memory storing instructions which when executed by the processor performs a method, the method comprising; determining an external infrastructure of an entity, the external infrastructure comprising one or more cyber assets utilized by the entity; collecting infrastructure information regarding the one or more cyber assets; performing passive cyber security vulnerability testing on the one or more cyber assets using the collected infrastructure information; assessing cyber security vulnerabilities of the one or more cyber assets based on the performing of passive cyber security vulnerability testing; calculating an association score for the one or more cyber assets based on the assessed cyber security vulnerabilities; and automatically recommending, based on the association score, computer network changes for the one or more cyber assets to reduce the assessed cyber security vulnerabilities. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A method, comprising:
-
assessing a plurality of online resources of an entity; collecting identifying information for the plurality of online resources; searching, based on the collected identifying information for the plurality of online resources, for information sources that have exposed sensitive information regarding the plurality of online resources; determining cyber security vulnerabilities using the exposed sensitive information; and automatically recommending, based on the cyber security vulnerabilities, computer network changes for the plurality of online resources to reduce the cyber security vulnerabilities.
-
Specification