Security indication spanning tree system and method
First Claim
Patent Images
1. A security indication spanning tree method comprising:
- determining asset value of a network node;
ascertaining exposure rating of said network node;
establishing a functional priority risk indicator for indicating the likelihood of an attack from another network node; and
creating a spanning tree schematic of a network including said network node, wherein said spanning tree schematic includes an indication of said asset value.
3 Assignments
0 Petitions
Accused Products
Abstract
A security indication spanning tree system and method is presented. In one embodiment the asset value of a network node is determined. The exposure rating of said network node is ascertained. The impact risk to a preferred functionality due to an attack from another network node is analyzed. A spanning tree schematic of a network including the network node is created, wherein the spanning tree schematic includes an indication of the asset value.
8 Citations
20 Claims
-
1. A security indication spanning tree method comprising:
-
determining asset value of a network node; ascertaining exposure rating of said network node; establishing a functional priority risk indicator for indicating the likelihood of an attack from another network node; and creating a spanning tree schematic of a network including said network node, wherein said spanning tree schematic includes an indication of said asset value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A security indication spanning tree system comprising:
-
a bus for communicating information; a processor coupled to said bus, said processor for processing said information including instructions for building an attack impact susceptibility spanning tree representation including asset value factors; and a memory coupled to said bus, said memory for storing said information, including instructions for building said attack impact susceptibility spanning tree representation including said asset value factors. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A computer usable storage medium having computer readable program code embodied therein for causing a computer system to implement security indication spanning tree instructions comprising:
-
a device examination module for examining information regarding devices included in a centralized resource network, wherein said examining includes ascertaining what applications said devices support; an importance indication module for obtaining an indication of a relative importance of functionality provided by said device; and a spanning tree module for building a spanning tree topology representation including said indication of said relative importance of said device in supporting said applications. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification