首页> 外国专利> A METHOD AND A SOFTWARE SYSTEM FOR END-TO-END SECURITY ASSESSMENT FOR SECURITY AND CIP PROFESSIONALS

A METHOD AND A SOFTWARE SYSTEM FOR END-TO-END SECURITY ASSESSMENT FOR SECURITY AND CIP PROFESSIONALS

机译:用于安全和CIP专业人员的端到端安全性评估的方法和软件系统

摘要

A method and software system for Security and CIP Professionals (CIP) that addresses the shortcomings in today's Critical Infrastructure Protection (CIP) methods, and offers a new security assessment methodology equipped to meet the present challenges of CIP, as well as future challenges. The method is based on an End-to-End Security Assessment (EESA) that provides a wide examination of system information flows. The method disclosed is for implementing end-to-end security assessment (EESA) for use by Security and CIP professionals for large, complex, critical infrastructure (LCCI) systems. The first step of the method is determining security policy and sensitivity levels of data. Further steps include identifying and analyzing critical business-derived information flows for the layers, security mechanisms, formats and communications protocols of the system; assessing each of said information flows for security gaps; determining the risk level of each of said information flows by applying a formula that takes into account the threat, its likelihood and its potential impact on the system; comparing the required defence levels to said security mechanisms, listing all gaps found according to a prioritization process that determines the urgency of closing each gap and creating a detailed list of the prioritized gaps; and offering specific countermeasures to close each of said gaps, wherein emphasis is put on optimizing said countermeasures.
机译:一种用于安全和CIP专业人员(CIP)的方法和软件系统,可解决当今关键基础设施保护(CIP)方法的不足,并提供一种新的安全评估方法,以应对CIP的当前挑战以及未来的挑战。该方法基于端到端安全评估(EESA),该评估提供了系统信息流的广泛检查。所公开的方法用于实施端对端安全评估(EESA),以供安全和CIP专业人员用于大型,复杂,关键的基础结构(LCCI)系统。该方法的第一步是确定安全策略和数据的敏感度级别。进一步的步骤包括为系统的层,安全机制,格式和通信协议识别和分析关键的业务衍生信息流;评估每个上述信息流的安全漏洞;通过应用考虑威胁,威胁的可能性及其对系统的潜在影响的公式,确定每个所述信息流的风险级别;将所需的防御级别与所述安全机制进行比较,根据优先级排序过程列出发现的所有漏洞,该优先级排序过程确定紧迫每个漏洞并创建详细的优先级漏洞列表的紧迫性;提供具体的对策以弥合每个所述差距,其中重点在于优化所述对策。

著录项

  • 公开/公告号EP1984818A4

    专利类型

  • 公开/公告日2010-08-11

    原文格式PDF

  • 申请/专利权人 WHITE CYBER KNIGHT LTD.;

    申请/专利号EP20060832258

  • 发明设计人 ADAR EYAL;

    申请日2006-12-19

  • 分类号G06F12/14;G06Q10/00;

  • 国家 EP

  • 入库时间 2022-08-21 18:38:15

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号