SECURITY RISK MANAGEMENT
First Claim
1. A method comprising:
- receiving traces of activities of an online user who is associated with an entity; and
inferring by analysis of the traces a security state of the entity.
3 Assignments
0 Petitions
Accused Products
Abstract
Among other things, traces are received of activities of an online user who is associated with an entity. By analysis of the traces a security state of the entity is inferred. Also, a map is generated between (a) technical assets that contribute to security characteristics of respective entities and (b) the identities of the entities that are associated with the respective technical assets. At least part of the generating of the map is done automatically. A user can be engaged to assist in the generating of the map by presenting to the user through a user interface (a) data about the technical assets of entities and (b) an interactive tool for associating the technical assets with the identities of the entities.
18 Citations
20 Claims
-
1. A method comprising:
-
receiving traces of activities of an online user who is associated with an entity; and inferring by analysis of the traces a security state of the entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification