×

Adaptive risk analysis methods and apparatus

  • US 8,321,944 B1
  • Filed: 06/12/2007
  • Issued: 11/27/2012
  • Est. Priority Date: 06/12/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method for a computer system including a display device comprising:

  • receiving, by the computer system, configuration data for at least one network device in a network, wherein the configuration data includes at least one device configuration file;

    receiving, by the computer system, a network topology for at least a portion of the network, wherein the network topology indicates a first server location and a threat source remote from the first server location, and configuration data associated with at least the portion of the network, wherein the network topology comprises incomplete information about the first server location;

    determining, by the computer system, at least a first vulnerability to the threat source associated with the first server location, wherein the vulnerability includes a plurality of vulnerability attributes; and

    determining, by the computer system, a first security exposure of the first server location by determining a reachability of the first server location from the threat source using at least the configuration data;

    determining, by the computer system, a coverage factor score for the first server location correlating to the incomplete information, based on the network topology, and the at least one device configuration file;

    accounting for the incomplete information by determining, by the computer system, a first vulnerability certainty associated with the first server location with respect to the vulnerability by calculating a probability that the first vulnerability exists based on the coverage factor score for the first server location and the network topology;

    thereafterreceiving updated network data selected from a group consisting of;

    updated configuration data, updated network topology;

    determining a second security exposure of the first server location with respect to the threat source in response to the updated network data, and to configuration data associated with the first server location; and

    displaying an indication of a difference between the first security exposure and the second security exposure on the display device.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×