×

Asset risk analysis

  • US 8,495,745 B1
  • Filed: 11/30/2009
  • Issued: 07/23/2013
  • Est. Priority Date: 11/30/2009
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • receiving, at a data processing apparatus, threat definition data, the threat definition data including, for each of one or more threats, an identification of the threat and an identification of one or more countermeasures that reduce a risk that the threat will affect an asset;

    receiving, at the data processing apparatus, vulnerability detection data for each of one or more assets and countermeasure detection data for each of the one or more assets, wherein the vulnerability detection data for each asset identifies threats to which the asset is vulnerable and the countermeasure detection data for each asset identifies one or more countermeasures protecting the asset; and

    determining, with the data processing apparatus, a respective risk metric for each of the one or more assets for each of the one or more threats, the determining including, for a particular asset and a particular threat;

    analyzing the vulnerability detection data for the particular asset to determine whether the particular asset is vulnerable to the particular threat;

    determining from the threat definition data and the countermeasure detection data whether the particular asset is protected from the particular threat by one or more countermeasures, wherein determining whether the particular asset is protected includes;

    determining that the particular asset is protected by a set of countermeasures including a network-based countermeasure and an agent-based countermeasure; and

    determining a likelihood that the network-based countermeasure protects the particular asset; and

    determining a likelihood that the agent-based countermeasure protects the particular asset; and

    determining the risk metric for the particular asset for the particular threat according to whether the particular asset is vulnerable to the particular threat and whether the particular asset is protected by one of the countermeasures identified for the particular threat.

View all claims
  • 10 Assignments
Timeline View
Assignment View
    ×
    ×