SYSTEM FOR MONITORING AND ADDRESSING EVENTS BASED ON TRIPLET METRIC ANALYSIS
First Claim
1. A system for monitoring and addressing events based on triplet metric analysis, the system comprising:
- one or more memory devices; and
one or more processing devices operatively coupled to the one or more memory devices, wherein the one or more processing devices are configured to execute computer-readable program code to;
transmit control signals to cause a vendor database system to continuously monitor a vendor database for a new data input and, in response to identifying the new data input, automatically transmit the new data input to the system, wherein the new data input comprises at least a threat actor, a threat means, and a targeted asset;
receive the new data input from the vendor database system;
identify a threat actor value based on a comparison of the threat actor to an actor value database;
identify a threat means value based on a comparison of the threat means to a means value database;
identify a targeted asset value based on a comparison of the targeted asset to an asset value database;
calculate a threat-based exposure model based at least on the identified threat actor value, the identified threat means value, and the identified targeted asset value; and
in response to calculating the threat-based exposure model, transmit control signals configured to cause a computing device system associated with a user to display a three-dimensional representation of the threat-based exposure model.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the present invention provide a system for monitoring and addressing events based on triplet metric analysis. In some embodiments, the system transmits control signals to cause a vendor database system to continuously monitor a vendor database for a new data input and, in response to identifying the new data input, automatically transmits the new data input back to the system. From the new data input, the system may identify actors, actor values, means, means values, assets, and asset values associated with certain events. The system may then determine a model based on the new data input and transmit control signals configured to cause a computing device system associated with a user to display a three-dimensional representation of the model.
-
Citations
20 Claims
-
1. A system for monitoring and addressing events based on triplet metric analysis, the system comprising:
-
one or more memory devices; and one or more processing devices operatively coupled to the one or more memory devices, wherein the one or more processing devices are configured to execute computer-readable program code to; transmit control signals to cause a vendor database system to continuously monitor a vendor database for a new data input and, in response to identifying the new data input, automatically transmit the new data input to the system, wherein the new data input comprises at least a threat actor, a threat means, and a targeted asset; receive the new data input from the vendor database system; identify a threat actor value based on a comparison of the threat actor to an actor value database; identify a threat means value based on a comparison of the threat means to a means value database; identify a targeted asset value based on a comparison of the targeted asset to an asset value database; calculate a threat-based exposure model based at least on the identified threat actor value, the identified threat means value, and the identified targeted asset value; and in response to calculating the threat-based exposure model, transmit control signals configured to cause a computing device system associated with a user to display a three-dimensional representation of the threat-based exposure model. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product for monitoring and addressing events based on triplet metric analysis, the computer program product comprising at least one non-transitory computer readable medium comprising computer readable instructions, the instructions comprising instructions for:
-
transmitting control signals to cause a vendor database system to continuously monitor a vendor database for a new data input and, in response to identifying the new data input, automatically transmit the new data input to the system, wherein the new data input comprises at least a threat actor, a threat means, and a targeted asset; receiving the new data input from the vendor database system; identifying a threat actor value based on a comparison of the threat actor to an actor value database; identifying a threat means value based on a comparison of the threat means to a means value database; identifying a targeted asset value based on a comparison of the targeted asset to an asset value database; calculating a threat-based exposure model based at least on the identified threat actor value, the identified threat means value, and the identified targeted asset value; and in response to calculating the threat-based exposure model, transmitting control signals configured to cause a computing device system associated with a user to display a three-dimensional representation of the threat-based exposure model. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer implemented method for monitoring and addressing events based on triplet metric analysis, said computer implemented method comprising:
-
transmitting control signals to cause a vendor database system to continuously monitor a vendor database for a new data input and, in response to identifying the new data input, automatically transmit the new data input to the system, wherein the new data input comprises at least a threat actor, a threat means, and a targeted asset; receiving the new data input from the vendor database system; identifying a threat actor value based on a comparison of the threat actor to an actor value database; identifying a threat means value based on a comparison of the threat means to a means value database; identifying a targeted asset value based on a comparison of the targeted asset to an asset value database; calculating a threat-based exposure model based at least on the identified threat actor value, the identified threat means value, and the identified targeted asset value; and in response to calculating the threat-based exposure model, transmitting control signals configured to cause a computing device system associated with a user to display a three-dimensional representation of the threat-based exposure model. - View Dependent Claims (16, 17, 18, 19)
-
-
20. The computer implemented method of claim 20, wherein the computer implemented method further comprises instructions, in response to calculating the total threat-based exposure value, transmitting control signals configured to cause the computing device system associated with the user to display a three-dimensional representation of the total threat-based exposure value.
Specification