首页>
外国专利>
SYSTEMS AND METHODS FOR VULNERABILITY-BASED CYBER THREAT RISK ANALYSIS AND TRANSFER
SYSTEMS AND METHODS FOR VULNERABILITY-BASED CYBER THREAT RISK ANALYSIS AND TRANSFER
展开▼
机译:基于漏洞的网络威胁风险分析和转移系统和方法
展开▼
页面导航
摘要
著录项
相似文献
摘要
A computing device configured for predictive functions related to cyber threat risk accesses historical cybersecurity event data that lists past attacks on particular companies in different industry vertical classifications. Using vulnerability data associated with each attack, enhanced by metadata specifying vulnerable hardware and/or software stacks associated with the attacks, exemplary technology configurations are created that map industry vertical classifications to vulnerable hardware and/or software stacks. These exemplary technology configurations are used as bases for comparison to subject technology configurations under evaluation. A comparison of a subject technology configuration parameters to parameters of the plurality of exemplary technology configurations can reveal similarities that indicate that the subject technology configuration is vulnerable one or more same threats that the exemplary technology configurations are known to be vulnerable to or that the subject technology configuration is susceptible to heightened cyber threat risk, based on historical cybersecurity event data.
展开▼