×

Cyber risk analysis and remediation using network monitored sensors and methods of use

  • US 10,404,748 B2
  • Filed: 03/28/2016
  • Issued: 09/03/2019
  • Est. Priority Date: 03/31/2015
  • Status: Active Grant
First Claim
Patent Images

1. A system, comprising:

  • one or more computing systems that are subject to a cyber risk policy, the cyber risk policy comprising breach parameters defining one or more events that are indicative of a cyber security breach, the breach parameters being associated with a remediation provision in a policy for the computing systems and a network;

    one or more data collecting devices deployed within the network that collect entity information and monitor network traffic of the network that is related to security information;

    a processor configured to;

    utilize the entity information and the network traffic to calculate a composite score from a motivation score and a sophistication score, wherein the motivation score is indicative of a desire level of a malicious actor to cause a cyber security risk for the entity and the sophistication score is indicative of a cyber security sophistication of the entity;

    automatically detect occurrence of one or more of the events that are indicative of a cyber security breach based on the network traffic;

    automatically determine the breach parameters that apply for the one or more events that occurred;

    generate a remediation of cyber security parameters for the network based on the applicable breach parameters determined and the associated remediation provision, wherein the remediation of cyber security parameters at least includes modifying a password requirement associated with the one or more computer systems; and

    perform the remediation based on the breach parameters, wherein the remediation causes network changes that selectively reduce the motivation score for the entity or selectively increase the sophistication score of the entity, wherein at least one of the network changes includes increasing a password complexity associated with the system and prompting a user associated with the entity to create an associated password that complies with the password complexity; and

    a memory coupled to the processor and configured to provide the processor with instructions.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×