×

Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture

  • US 9,092,631 B2
  • Filed: 10/16/2013
  • Issued: 07/28/2015
  • Est. Priority Date: 10/16/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented security evaluation method comprising:

  • accessing information regarding a physical architecture and a cyber architecture of a facility;

    building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas;

    identifying a target within the facility;

    executing the model a plurality of times to simulate a plurality of attacks against the target by at least one adversary traversing at least one of the physical areas and at least one of the cyber areas;

    using results of the executing, providing information regarding a security risk of the facility with respect to the target;

    wherein individual executions of the model comprise initiating counting of a timer once the at least one adversary is detected; and

    wherein the providing comprises providing information indicating whether the at least one adversary reached the target during the executions of the model using information of the timer.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×