×

Methods and apparatus for prioritization of remediation techniques for network security risks

  • US 8,132,260 B1
  • Filed: 06/12/2007
  • Issued: 03/06/2012
  • Est. Priority Date: 06/12/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method for a computer system including a display device comprising:

  • receiving, by the computer system, a description of a first network topology for at least a portion of a network, wherein the first network topology includes at least;

    a location of a first server device, existence of a threat source device remote from the first server location and a first set of vulnerabilities defined by at least vulnerability attributes of the first server device relative to the threat source device;

    determining, by the computer system, a current security risk value of the first server device based on at least the first network topology, the first set of vulnerabilities and a reachability of the first server from the threat source;

    determining, by the computer system, a plurality of remediation actions in response to the current security risk value and first network topology wherein;

    each remediation action includes a modification to the network topology and the plurality of remediation actions comprises, at least, a first remediation action and a second remediation action;

    for at least two of the plurality of remediation actions;

    determining, by the computer system, a description of a network topology based on the first network topology and the at least one of the plurality of remediation actions wherein the new network topology indicates at least;

    the location of the first server device, the existence of the threat source device and a new set of vulnerabilities defined by at least vulnerability attributes of the first server device relative to the threat source device;

    determining, by the computer system, an updated security risk value of the first server device based on at least the new network topology the new set of vulnerabilities and the reachability of the first server from the threat source; and

    displaying a prioritized list of said remediation actions from the plurality of remediation actions on the display device based on the updated security risk associated with each remediation action.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×