×

System and method of managing network security risks

  • US 8,201,257 B1
  • Filed: 03/31/2004
  • Issued: 06/12/2012
  • Est. Priority Date: 03/31/2004
  • Status: Active Grant
First Claim
Patent Images

1. A security risk management system, comprising:

  • a processor and a memory;

    a vulnerability database comprising data indicative of security vulnerabilities possessed by each asset of a plurality of assets connected to a computer network;

    an asset database comprising data indicative of attributes possessed by each asset of the plurality of assets such that the vulnerability database and the asset database together define for each asset a group of security vulnerabilities and attributes possessed by each asset; and

    a threat correlation module in communication with the vulnerability database and the asset database and configured to;

    receive at least one threat intelligence alert that comprises data identifying at least one security threat that affects a class of assets, wherein the threat intelligence alert defines the affected class of assets with reference to an associated group of attributes and security vulnerabilities possessed by the affected class of assets;

    identify a selected threat from the at least one security threat identified by the at least one threat intelligence alert;

    identify any assets affected by the selected threat, wherein the asset is deemed to be affected by the selected threat if the group of attributes and security vulnerabilities associated with the selected threat matches the group of attributes and security vulnerabilities possessed by the asset, wherein a user recommendation is provided for responding to the selected threat;

    generate a prioritized list of the affected assets based on their respective security risks such that scanning activities are initiated for at least some of the affected assets based on their respective security risks; and

    communicate with a threat response module configured to access a vulnerability remediation module and to initiate a ticketing and workflow process that at least partially directs remediation of asset vulnerabilities, wherein the ticketing and workflow process assigns at least one user at least one specific remediation task, and initiates a check-up vulnerability scan in order to verify that the remediation has occurred.

View all claims
  • 13 Assignments
Timeline View
Assignment View
    ×
    ×