DEPLOYMENT ASSURANCE CHECKS FOR MONITORING INDUSTRIAL CONTROL SYSTEMS
First Claim
Patent Images
1. A method comprising:
- identifying, by a risk manager system, a plurality of connected devices that are vulnerable to cyber-security risks;
determining, by the risk manager system, devices to be monitored from the plurality of connected devices;
evaluating system resource usage, by the risk manager system, on each device to be monitored; and
providing recommendations to a user, by the risk manager system, as to whether or not the user should proceed with the monitoring, based on the evaluation.
1 Assignment
0 Petitions
Accused Products
Abstract
This disclosure provides an apparatus and method for deployment assurance checks for monitoring industrial control systems and other systems. A method includes identifying, by a risk manager system, a plurality of connected devices that are vulnerable to cyber-security risks. The method includes determining devices to be monitored from the plurality of connected devices. The method includes evaluating system resource usage, by the risk manager system, on each device to be monitored. The method includes providing recommendations to a user as to whether or not the user should proceed with the monitoring, based on the evaluation.
15 Citations
20 Claims
-
1. A method comprising:
-
identifying, by a risk manager system, a plurality of connected devices that are vulnerable to cyber-security risks; determining, by the risk manager system, devices to be monitored from the plurality of connected devices; evaluating system resource usage, by the risk manager system, on each device to be monitored; and providing recommendations to a user, by the risk manager system, as to whether or not the user should proceed with the monitoring, based on the evaluation. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A risk manager system comprising:
-
a controller; and a memory, the risk manager system configured to; identify a plurality of connected devices that are vulnerable to cyber-security risks; determine devices to be monitored from the plurality of connected devices; evaluate system resource usage on each device to be monitored; and provide recommendations to a user as to whether or not the user should proceed with the monitoring, based on the evaluation. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory machine-readable medium encoded with executable instructions that, when executed, cause one or more processors of a risk manager system to:
-
identify a plurality of connected devices that are vulnerable to cyber-security risks; identify cyber-security risks in the connected devices; for each identified cyber-security risk, identify at least one possible cause, at least one recommended action, and at least one potential impact; and display a user interface that includes a summary of the identified cyber-security to risks. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification