CYBER SECURITY RISK MODEL AND INDEX
First Claim
1. A method for determining a cyber security risk index associated with a virtual asset, comprising:
- determining one or more functions associated with one or more devices of the virtual asset;
determining one or more connections associated with each function;
determining one or more identities associated with each function;
determining the cyber security risk index for the virtual asset based, at least in part, on the one or more functions, the one or more connections and the one or more identities; and
altering a configuration of the virtual asset based, at least in part, on the cyber security risk index.
1 Assignment
0 Petitions
Accused Products
Abstract
A cyber security risk model mitigates cyber security risks for an asset environment (including a virtual asset) by utilizing a functions, connections and identities to determine a cyber security risk index (CSRI). An asset environment may comprise one or more functions where each function has one or more connections associated with any one or more of the functions and one or more identities associated with the virtual asset. A CSRI may be determined for each function based on the cyber security risk model that takes into account the cyber security risks or attributes associated with each function, connection and identity associated with the virtual environment or virtual asset. The asset environment may be adjusted, reconfigured, or otherwise altered based on the CSRI for any given function or for an overall CSRI. An alert may also be triggered based, at least in part, on a determined CSRI.
15 Citations
20 Claims
-
1. A method for determining a cyber security risk index associated with a virtual asset, comprising:
-
determining one or more functions associated with one or more devices of the virtual asset; determining one or more connections associated with each function; determining one or more identities associated with each function; determining the cyber security risk index for the virtual asset based, at least in part, on the one or more functions, the one or more connections and the one or more identities; and altering a configuration of the virtual asset based, at least in part, on the cyber security risk index. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable medium storing one or more instructions that, when executed by a processor, cause the processor to:
-
determine one or more functions associated with one or more devices the virtual asset; determine one or more connections associated with each function; determine one or more identities associated with each function; determine the cyber security risk index for the virtual asset based, at least in part, on the one or more functions, the one or more connections and the one or more identities; and alter a configuration of the virtual asset based, at least in part, on the cyber security risk index. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An information handling system comprising:
-
a memory; a processor coupled to the memory, wherein the memory comprises one or more instructions executable by the processor to; determine one or more functions associated with one or more devices of the virtual asset; determine one or more connections associated with each function; determine one or more identities associated with each function; determine the cyber security risk index for the virtual asset based, at least in part, on the one or more functions, the one or more connections and the one or more identities; and alter a configuration of the virtual asset based, at least in part, on the cyber security risk index. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification