×

Systems and methods for assessing cyber risks using incident-origin information

  • US 10,516,680 B1
  • Filed: 06/22/2016
  • Issued: 12/24/2019
  • Est. Priority Date: 06/22/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for assessing cyber risks using incident-origin information, at least a portion of the method being performed by at least one computing device comprising at least one processor, the method comprising:

  • receiving, by the at least one computing device, a request to perform a security action based on a security hygiene of a private network of an organization of interest, wherein;

    the request comprises an offline identifier of the organization; and

    the private network comprises a plurality of computing devices whose public Internet addresses are unknown to the at least one computing device when the request is received;

    using, by the at least one computing device, at least one Internet-address data source that maps offline identifiers of organizations to public Internet addresses of the organizations to translate the offline identifier of the organization into a set of candidate public Internet addresses that are likely to be the public Internet addresses of the plurality of computing devices;

    using, by the at least one computing device, at least one incident-origin data source that maps externally-detected security incidents to public Internet addresses from which the security incidents originated to translate the set of candidate public Internet addresses into a set of security incidents that likely originated from the private network of the organization;

    using, by the at least one computing device, the set of security incidents to estimate the security hygiene of the private network; and

    performing, by the at least one computing device, the security action based on the estimated security hygiene.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×