METHOD AND DEVICE FOR EVALUATING SECURITY ASSESSMENT OF AN APPLICATION
First Claim
1. A method for evaluating security assessment of an application, comprising:
- receiving, by a security assessment computing device, application entry data associated with a plurality of entry points of the application;
identifying, by the security assessment computing device, at least one security threat entry point based on the application entry data;
computing, by the security assessment computing device, a coverage index value based on the application entry data and the at least one security threat entry point; and
generating, by the security assessment computing device, a recommendation report indicating security coverage of the application based on the coverage index value.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the present disclosure disclose a method and a device for evaluating security assessment of an application. The method comprises receiving application entry data associated with a plurality of entry points of the application. Also, the method comprises identifying at least one security threat entry point based on the application entry data. Further, the method comprises computing a coverage index value based on the application entry data and the at least one security threat entry point and generating a recommendation report indicating security coverage of the application based on the coverage index value.
26 Citations
20 Claims
-
1. A method for evaluating security assessment of an application, comprising:
-
receiving, by a security assessment computing device, application entry data associated with a plurality of entry points of the application; identifying, by the security assessment computing device, at least one security threat entry point based on the application entry data; computing, by the security assessment computing device, a coverage index value based on the application entry data and the at least one security threat entry point; and generating, by the security assessment computing device, a recommendation report indicating security coverage of the application based on the coverage index value. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A security assessment computing device for evaluating security assessment of an application, comprising:
-
a processor; and a memory communicatively coupled to the processor, wherein the memory stores processor-executable instructions, which, on execution, causes the processor to; receive application entry data associated with a plurality of entry points of the application; identify at least one security threat entry point based on the application entry data; compute a coverage index value based on the application entry data and the at least one security threat entry point; and generate a recommendation report indicating security coverage of the application based on the coverage index value. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory computer readable medium including instructions stored thereon that when processed by at least one processor cause a system to perform operations comprising:
-
receive application entry data associated with a plurality of entry points of the application; identify at least one security threat entry point based on the application entry data; compute a coverage index value based on the application entry data and the at least one security threat entry point; and generate a recommendation report indicating security coverage of the application based on the coverage index value. - View Dependent Claims (17, 18, 19, 20)
-
Specification