SYSTEMS FOR NETWORK RISK ASSESSMENT INCLUDING PROCESSING OF USER ACCESS RIGHTS ASSOCIATED WITH A NETWORK OF DEVICES
First Claim
1. A computerized method comprising:
- by a system of one or more computers,determining, based on information describing network traffic, a network topology of a network, the network topology comprising a plurality of nodes each connected by an edge to one or more of the plurality of nodes, and each node being associated with one or more network devices;
determining, for each node, respective compromise risks of network devices associated with the node; and
providing, for presentation in a user interface, visual representations of one or more of the nodes and associated compromise risks, wherein the visual representations are colored according to associated compromise risks.
8 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for network risk assessment. One of the methods includes obtaining information describing network traffic between a plurality of network devices within a network. A network topology of the network is determined based on the information describing network traffic, with the network topology including nodes connected by an edge to one or more other nodes, and with each node being associated with one or more network devices. Indications of user access rights of users are associated to respective nodes included in the network topology. User interface data associated with the network topology is generated.
-
Citations
20 Claims
-
1. A computerized method comprising:
-
by a system of one or more computers, determining, based on information describing network traffic, a network topology of a network, the network topology comprising a plurality of nodes each connected by an edge to one or more of the plurality of nodes, and each node being associated with one or more network devices; determining, for each node, respective compromise risks of network devices associated with the node; and providing, for presentation in a user interface, visual representations of one or more of the nodes and associated compromise risks, wherein the visual representations are colored according to associated compromise risks. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. The computerized method of 1, wherein the visual representations comprise circles.
-
8. A system comprising one or more computer systems and one or more computer storage media storing instructions that when executed by the computer systems cause the computer systems to perform operations comprising:
-
determining, based on information describing network traffic, a network topology of a network, the network topology comprising a plurality of nodes each connected by an edge to one or more of the plurality of nodes, and each node being associated with one or more network devices; determining, for each node, respective compromise risks of network devices associated with the node; and providing, for presentation in a user interface, visual representations of one or more of the nodes and associated compromise risks, wherein the visual representations are colored according to associated compromise risks. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. Non-transitory computer storage media storing instruction that when executed by a system of one or more computers, cause the one or more computers to perform operations comprising:
-
determining, based on information describing network traffic, a network topology of a network, the network topology comprising a plurality of nodes each connected by an edge to one or more of the plurality of nodes, and each node being associated with one or more network devices; determining, for each node, respective compromise risks of network devices associated with the node; and providing, for presentation in a user interface, visual representations of one or more of the nodes and associated compromise risks, wherein the visual representations are colored according to associated compromise risks. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification