Network risk analysis
First Claim
Patent Images
1. A method of analyzing security risk in a computer network comprising:
- constructing asset relationships among a plurality of objects in the computer network;
receiving an event associated with a selected object;
wherein the event has an event risk level;
dynamically updating the asset relationships, the update being based at least in part on an analysis of source or destination information associated with the event; and
propagating the event to objects related to the selected object, if the event risk level exceeds a propagation threshold.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method are disclosed for analyzing security risks in a computer network. The system constructs asset relationships among a plurality of objects in the computer network and receives an event associated with a selected object, where the event has an event risk level. The system also propagates the event to objects related to the selected object if the event risk level exceeds a propagation threshold.
43 Citations
39 Claims
-
1. A method of analyzing security risk in a computer network comprising:
-
constructing asset relationships among a plurality of objects in the computer network; receiving an event associated with a selected object;
wherein the event has an event risk level;dynamically updating the asset relationships, the update being based at least in part on an analysis of source or destination information associated with the event; and propagating the event to objects related to the selected object, if the event risk level exceeds a propagation threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer program product for analyzing security risk in a computer network, the computer program product being embodied in a computer readable medium and comprising computer instructions for:
-
constructing asset relationships among a plurality of objects in the computer network; receiving an event associated with a selected object;
wherein the event has an event risk level;dynamically updating the asset relationships, the update being based at least in part on an analysis of source or destination information associated with the event; and propagating the event to objects related to the selected object, if the event risk level exceeds a propagation threshold. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 39)
-
-
28. A system for analyzing security risk in a computer network comprising:
-
an input interface configured to receive an event associated with a selected object; a processor configured to; construct asset relationships among a plurality of objects in the computer network; dynamically update the asset relationships, the update being based at least in part on an analysis of source or destination information associated with the event; and propagate the event to objects related to the selected object, if the event risk level exceeds a propagation threshold. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
Specification