Cyber vulnerability scan analyses with actionable feedback
First Claim
1. A method, comprising:
- determining an external infrastructure of an entity, the entity being coupled to a network, the external infrastructure comprising one or more cyber assets utilized by the entity;
collecting infrastructure information regarding the one or more cyber assets;
performing passive cyber security vulnerability testing on the one or more cyber assets using the collected infrastructure information;
assessing cyber security vulnerabilities of the one or more cyber assets based on the performing of passive cyber security vulnerability testing;
calculating an association score for the one or more cyber assets based on the assessed cyber security vulnerabilities;
automatically recommending to the entity via the network, based on the association score, computer network changes for the one or more cyber assets to reduce the assessed cyber security vulnerabilities; and
determining that the entity has enacted at least a portion of the recommended computer network changes for the one or more cyber assets, and in response, automatically re-performing passive cyber security vulnerability testing on the one or more cyber assets based on the recommended computer network changes.
4 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the present technology relate to cyber attack vulnerability analyzes. In one embodiment, a method includes determining an external infrastructure of an entity, the external infrastructure including one or more cyber assets utilized by the entity, collecting infrastructure information regarding the one or more cyber assets, performing passive cyber security vulnerability testing on the one or more cyber assets using the collected infrastructure information, assessing cyber security vulnerabilities of the one or more cyber assets, calculating an association score for the one or more cyber assets based on the assessed cyber security vulnerabilities, and automatically recommending, based on the association score, computer network changes to reduce the cyber security vulnerabilities.
186 Citations
20 Claims
-
1. A method, comprising:
-
determining an external infrastructure of an entity, the entity being coupled to a network, the external infrastructure comprising one or more cyber assets utilized by the entity; collecting infrastructure information regarding the one or more cyber assets; performing passive cyber security vulnerability testing on the one or more cyber assets using the collected infrastructure information; assessing cyber security vulnerabilities of the one or more cyber assets based on the performing of passive cyber security vulnerability testing; calculating an association score for the one or more cyber assets based on the assessed cyber security vulnerabilities; automatically recommending to the entity via the network, based on the association score, computer network changes for the one or more cyber assets to reduce the assessed cyber security vulnerabilities; and determining that the entity has enacted at least a portion of the recommended computer network changes for the one or more cyber assets, and in response, automatically re-performing passive cyber security vulnerability testing on the one or more cyber assets based on the recommended computer network changes. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system, comprising:
-
a processor; and a memory communicatively coupled with the processor, the memory storing instructions which when executed by the processor performs a method, the method comprising; determining an external infrastructure of an entity, the entity being coupled to a network, the external infrastructure comprising one or more cyber assets utilized by the entity; collecting infrastructure information regarding the one or more cyber assets; performing passive cyber security vulnerability testing on the one or more cyber assets using the collected infrastructure information; assessing cyber security vulnerabilities of the one or more cyber assets based on the performing of passive cyber security vulnerability testing; calculating an association score for the one or more cyber assets based on the assessed cyber security vulnerabilities; automatically recommending to the entity via the network, based on the association score, computer network changes for the one or more cyber assets to reduce the assessed cyber security vulnerabilities; and determining that the entity has enacted at least a portion of the recommended computer network changes for the one or more cyber assets, and in response, automatically re-performing passive cyber security vulnerability testing on the one or more cyber assets based on the recommended computer network changes. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A method, comprising:
-
assessing a plurality of online resources of an entity, the entity being coupled to a network; collecting identifying information for the plurality of online resources; searching, based on the collected identifying information for the plurality of online resources, for information sources that have exposed sensitive information regarding the plurality of online resources; determining cyber security vulnerabilities using the exposed sensitive information; automatically recommending to the entity via the network, based on the cyber security vulnerabilities, computer network changes for the plurality of online resources to reduce the cyber security vulnerabilities; and determining that the entity has enacted at least a portion of the recommended computer network changes for the plurality of online resources of the entity, and in response, automatically re-performing searching for the information sources based on the recommended computer network changes.
-
Specification