Data Security and Risk Ranking Tool
First Claim
1. A risk ranking tool, comprising:
- a retrieval engine configured to access graph data from a graph database;
a data risk engine configured to;
determine a plurality of defined data risk scores from the graph data; and
calculate, using the plurality of defined data risk scores and a plurality of nodes and edges from the graph data, a plurality of calculated data risk scores that each indicate an amount of data risk for a respective one of the nodes;
an operational risk engine configured to;
determine a plurality of defined operational risk scores from the graph data; and
calculate, using the plurality of defined operational risk scores and the plurality of nodes and edges from the graph data, a plurality of calculated operational risk scores that each indicate an amount of operational risk for a respective one of the nodes;
a data security engine configured to;
access the calculated data risk scores and the operational risk scores;
determine whether any of the calculated data or operational risk scores equal or exceed a predefined score, and in response;
send an alert that indicates which calculated risk score exceeds the predefined score; and
initiate a security action related to the calculated risk score that exceeds the predefined score.
1 Assignment
0 Petitions
Accused Products
Abstract
A risk ranking tool includes a retrieval engine, a data risk engine, an operational risk engine, and a data security engine. The data risk engine calculates, using graph data, a plurality of calculated data risk scores that each indicate an amount of data risk for nodes of the graph data. The operational risk engine calculates, using the graph data, a plurality of calculated operational risk scores that each indicate an amount of operational risk for nodes of the graph data. The data security engine determines whether any of the calculated data or operational risk scores equal or exceed a predefined score, and in response, initiates a security action related to the calculated risk score that exceeds the predefined score.
21 Citations
20 Claims
-
1. A risk ranking tool, comprising:
-
a retrieval engine configured to access graph data from a graph database; a data risk engine configured to; determine a plurality of defined data risk scores from the graph data; and calculate, using the plurality of defined data risk scores and a plurality of nodes and edges from the graph data, a plurality of calculated data risk scores that each indicate an amount of data risk for a respective one of the nodes; an operational risk engine configured to; determine a plurality of defined operational risk scores from the graph data; and calculate, using the plurality of defined operational risk scores and the plurality of nodes and edges from the graph data, a plurality of calculated operational risk scores that each indicate an amount of operational risk for a respective one of the nodes; a data security engine configured to; access the calculated data risk scores and the operational risk scores; determine whether any of the calculated data or operational risk scores equal or exceed a predefined score, and in response; send an alert that indicates which calculated risk score exceeds the predefined score; and initiate a security action related to the calculated risk score that exceeds the predefined score. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
accessing graph data from a graph database; determining a plurality of defined data risk scores from the graph data; calculating, using the plurality of defined data risk scores and a plurality of nodes and edges from the graph data, a plurality of calculated data risk scores that each indicate an amount of data risk for a respective one of the nodes; determining a plurality of defined operational risk scores from the graph data; calculating, using the plurality of defined operational risk scores and the plurality of nodes and edges from the graph data, a plurality of calculated operational risk scores that each indicate an amount of operational risk for a respective one of the nodes; accessing the calculated data risk scores and the operational risk scores; determining whether any of the calculated data or operational risk scores equal or exceed a predefined score, and in response; sending an alert that indicates which calculated risk score exceeds the predefined score; and initiating a security action related to the calculated risk score that exceeds the predefined score. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. One or more computer-readable non-transitory storage media embodying software that is operable when executed to:
-
access graph data from a graph database; determine a plurality of defined data risk scores from the graph data; calculate, using the plurality of defined data risk scores and a plurality of nodes and edges from the graph data, a plurality of calculated data risk scores that each indicate an amount of data risk for a respective one of the nodes; determine a plurality of defined operational risk scores from the graph data; calculate, using the plurality of defined operational risk scores and the plurality of nodes and edges from the graph data, a plurality of calculated operational risk scores that each indicate an amount of operational risk for a respective one of the nodes; access the calculated data risk scores and the operational risk scores; determine whether any of the calculated data or operational risk scores equal or exceed a predefined score, and in response; send an alert that indicates which calculated risk score exceeds the predefined score; and initiate a security action related to the calculated risk score that exceeds the predefined score. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification