System for resource-centric threat modeling and identifying controls for securing technology resources
First Claim
1. A system for identifying threat vectors and implementing controls for securing internal technology resources within a network, the system comprising:
- at least one non-transitory storage device;
at least one processor; and
instruction code stored in said storage device, said instruction code being executable by the at least one processor and configured to cause said at least one processor to;
provide a threat vector analysis application for installation on a user device associated with a user;
electronically receive an analysis request associated with an internal resource from the user device, wherein receiving further comprises initiating the threat vector analysis application on the user device, whereby the initiating of the threat vector analysis application establishes a communicable link with a network associated with the internal resource;
electronically receive, via a distributed network of servers, information associated with the internal resource within the network;
determine one or more threat vectors associated with the internal resource, wherein the one or more threat vectors indicate one or more paths of access to the internal resource;
determine one or more controls associated with each of the one or more threat vectors associated with the internal resource, wherein the one or more controls are configured to determine access to the internal resource;
dynamically generate a graphical representation of the internal resource and the one or more threat vectors based on at least the received analysis request; and
initiate, via the established communicable link, a presentation of a user interface for display on the user device, the user interface comprising the graphical representation of the internal resource and the one or more threat vectors associated with the internal resource;
determine a frequency score associated with each of the one or more threat vectors, wherein the frequency score indicates a number of occurrence of a threat via each of the one or more threat vectors;
determine a magnitude of impact score associated with each of the one or more threat vectors, wherein the magnitude of impact score indicates a consequence of a loss event caused via each of the one or more threat vectors;
determine a strength associated with each of the one or more controls associated with each of the one or more threat vectors;
determine an exposure score associated with each of the one or more threat vectors based on at least the frequency score, the magnitude of impact score, and the strength associated with each of the one or more controls associated with each of the one or more threat vectors;
determine one or more additional controls;
determine a cost associated with the incorporation of each of the one or more additional controls;
determine that the cost associated with the incorporation of each of the one or more additional controls is lower than a difference between the exposure score associated with the at least one of the one or more threat vectors before implementation of the one or more additional controls and after the implementation of the one or more additional controls; and
based on determining that the cost associated with the incorporation of each of the one or more additional controls is lower than a difference between the exposure score associated with the at least one of the one or more threat vectors before implementation of the one or more additional controls and after the implementation of the one or more additional controls, incorporate the one or more additional controls.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, computer program products, and methods are described herein for identifying threat vectors and implementing controls for securing resources within a network. The present invention is configured to determine one or more threat vectors associated with the resource; determine one or more controls associated with each of the one or more threat vectors associated with the resource; determine whether the one or more controls associated with the at least one of the one or more threat vectors is capable of detecting the access by an external computing device via at least one of the one or more types of access; and dynamically generate a graphical representation of the resource and the one or more threat vectors based on at least the received analysis request.
145 Citations
20 Claims
-
1. A system for identifying threat vectors and implementing controls for securing internal technology resources within a network, the system comprising:
-
at least one non-transitory storage device; at least one processor; and instruction code stored in said storage device, said instruction code being executable by the at least one processor and configured to cause said at least one processor to; provide a threat vector analysis application for installation on a user device associated with a user; electronically receive an analysis request associated with an internal resource from the user device, wherein receiving further comprises initiating the threat vector analysis application on the user device, whereby the initiating of the threat vector analysis application establishes a communicable link with a network associated with the internal resource; electronically receive, via a distributed network of servers, information associated with the internal resource within the network; determine one or more threat vectors associated with the internal resource, wherein the one or more threat vectors indicate one or more paths of access to the internal resource; determine one or more controls associated with each of the one or more threat vectors associated with the internal resource, wherein the one or more controls are configured to determine access to the internal resource; dynamically generate a graphical representation of the internal resource and the one or more threat vectors based on at least the received analysis request; and initiate, via the established communicable link, a presentation of a user interface for display on the user device, the user interface comprising the graphical representation of the internal resource and the one or more threat vectors associated with the internal resource; determine a frequency score associated with each of the one or more threat vectors, wherein the frequency score indicates a number of occurrence of a threat via each of the one or more threat vectors; determine a magnitude of impact score associated with each of the one or more threat vectors, wherein the magnitude of impact score indicates a consequence of a loss event caused via each of the one or more threat vectors; determine a strength associated with each of the one or more controls associated with each of the one or more threat vectors; determine an exposure score associated with each of the one or more threat vectors based on at least the frequency score, the magnitude of impact score, and the strength associated with each of the one or more controls associated with each of the one or more threat vectors; determine one or more additional controls; determine a cost associated with the incorporation of each of the one or more additional controls; determine that the cost associated with the incorporation of each of the one or more additional controls is lower than a difference between the exposure score associated with the at least one of the one or more threat vectors before implementation of the one or more additional controls and after the implementation of the one or more additional controls; and based on determining that the cost associated with the incorporation of each of the one or more additional controls is lower than a difference between the exposure score associated with the at least one of the one or more threat vectors before implementation of the one or more additional controls and after the implementation of the one or more additional controls, incorporate the one or more additional controls. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computerized method for identifying threat vectors and implementing controls for securing internal technology resources within a network, the method comprising:
-
providing, using a computing device processor, a threat vector analysis application for installation on a user device associated with a user; electronically receiving, using a computing device processor, an analysis request associated with an internal resource from the user device, wherein receiving further comprises initiating the threat vector analysis application on the user device, whereby the initiating of the threat vector analysis application establishes a communicable link with a network associated with the internal resource; electronically receiving, via a distributed network of servers, information associated with the internal resource within the network; determining, using a computing device processor, one or more threat vectors associated with the internal resource, wherein the one or more threat vectors indicate one or more paths of access to the internal resource; determining, using a computing device processor, one or more controls associated with each of the one or more threat vectors associated with the internal resource, wherein the one or more controls are configured to determine access to the internal resource; dynamically generating, using a computing device processor, a graphical representation of the internal resource and the one or more threat vectors based on at least the received analysis request; initiating, via the established communicable link, a presentation of a user interface for display on the user device, the user interface comprising the graphical representation of the internal resource and the one or more threat vectors associated with the internal resource; determining, using a computing device processor, a frequency score associated with each of the one or more threat vectors, wherein the frequency score indicates a number of occurrence of a threat via each of the one or more threat vectors; determining, using a computing device processor, a magnitude of impact score associated with each of the one or more threat vectors, wherein the magnitude of impact score indicates a consequence of a loss event caused via each of the one or more threat vectors; determining, using a computing device processor, a strength associated with each of the one or more controls associated with each of the one or more threat vectors; and determining, using a computing device processor, an exposure score associated with each of the one or more threat vectors based on at least the frequency score, the magnitude of impact score, and the strength associated with each of the one or more controls associated with each of the one or more threat vectors; determining, using a computing device processor, one or more additional controls; determining, using a computing device processor, a cost associated with the incorporation of each of the one or more additional controls; determining, using a computing device processor, that the cost associated with the incorporation of each of the one or more additional controls is lower than a difference between the exposure score associated with the at least one of the one or more threat vectors before implementation of the one or more additional controls and after the implementation of the one or more additional controls; and based on determining that the cost associated with the incorporation of each of the one or more additional controls is lower than a difference between the exposure score associated with the at least one of the one or more threat vectors before implementation of the one or more additional controls and after the implementation of the one or more additional controls, incorporating, using a computing device processor, the one or more additional controls. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product for identifying threat vectors and implementing controls for securing internal technology resources within a network, the computer program product embodied on a non-transitory computer-readable medium comprising code configured to cause a first apparatus to:
-
provide a threat vector analysis application for installation on a user device associated with a user; electronically receive an analysis request associated with an internal resource from the user device, wherein receiving further comprises initiating the threat vector analysis application on the user device, whereby the initiating of the threat vector analysis application establishes a communicable link with a network associated with the internal resource; electronically receive, via a distributed network of servers, information associated with the internal resource within the network; determine one or more threat vectors associated with the internal resource, wherein the one or more threat vectors indicate one or more paths of access to the internal resource; determine one or more controls associated with each of the one or more threat vectors associated with the internal resource, wherein the one or more controls are configured to determine access to the internal resource; dynamically generate a graphical representation of the internal resource and the one or more threat vectors based on at least the received analysis request; and initiate, via the established communicable link, a presentation of a user interface for display on the user device, the user interface comprising the graphical representation of the internal resource and the one or more threat vectors associated with the internal resource; determine a frequency score associated with each of the one or more threat vectors, wherein the frequency score indicates a number of occurrence of a threat via each of the one or more threat vectors; determine a magnitude of impact score associated with each of the one or more threat vectors, wherein the magnitude of impact score indicates a consequence of a loss event caused via each of the one or more threat vectors; determine a strength associated with each of the one or more controls associated with each of the one or more threat vectors; determine an exposure score associated with each of the one or more threat vectors based on at least the frequency score, the magnitude of impact score, and the strength associated with each of the one or more controls associated with each of the one or more threat vectors; determine one or more additional controls; determine a cost associated with the incorporation of each of the one or more additional controls; determine that the cost associated with the incorporation of each of the one or more additional controls is lower than a difference between the exposure score associated with the at least one of the one or more threat vectors before implementation of the one or more additional controls and after the implementation of the one or more additional controls; and based on determining that the cost associated with the incorporation of each of the one or more additional controls is lower than a difference between the exposure score associated with the at least one of the one or more threat vectors before implementation of the one or more additional controls and after the implementation of the one or more additional controls, incorporate the one or more additional controls. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification