×

Systems and methods of associating security vulnerabilities and assets

  • US 8,095,984 B2
  • Filed: 03/02/2006
  • Issued: 01/10/2012
  • Est. Priority Date: 09/22/2005
  • Status: Active Grant
First Claim
Patent Images

1. An apparatus comprising:

  • a memory storing respective definitions of assets of an information system, relationships between the assets, and definitions of security vulnerabilities;

    a comparison module operatively coupled to the memory and configured for comparing the definition of a security vulnerability with the respective definitions of the assets, the security vulnerability definition identifying an exploited asset platform that may be exploited via the security vulnerability, an affected asset platform that is affected when the exploited asset platform is exploited via the security vulnerability, and a protecting asset platform that protects the exploited asset platform or the affected asset platform against the security vulnerability, the comparison module being further configured for determining whether (i) the definition of a particular asset identifies the exploited asset platform, (ii) the definition of another asset that has a relationship with the particular asset identifies the affected asset platform, (iii) the definition of a further asset identifies the protecting asset platform, and (iv) the further asset has a relationship with the one of the particular asset and the other asset whose definition identifies the exploited asset platform or the affected asset platform that is protected by the protecting asset platform; and

    an association module, operatively coupled to the comparison module and to the memory, configured for associating the security vulnerability and the particular asset where (i) the definition of the particular asset identifies the exploited asset platform and (ii) the definition of the other asset identifies the affected asset platform, the association module being further configured for creating a further association between the security vulnerability and the further asset where (iii) the definition of the further asset identifies the protecting asset platform, and (iv) the further asset has a relationship with the one of the particular asset and the other asset whose definition identifies the exploited asset platform or the affected asset platform that is protected by the protecting asset platform.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×