首页> 外国专利> SYSTEMS AND METHODS FOR VULNERABILITY-BASED CYBER THREAT RISK ANALYSIS AND TRANSFER

SYSTEMS AND METHODS FOR VULNERABILITY-BASED CYBER THREAT RISK ANALYSIS AND TRANSFER

机译:基于漏洞的网络威胁风险分析和转移系统和方法

摘要

A computing device configured for predictive functions related to cyber threat risk accesses historical cybersecurity event data that lists past attacks on particular companies in different industry vertical classifications. Using vulnerability data associated with each attack, enhanced by metadata specifying vulnerable hardware and/or software stacks associated with the attacks, exemplary technology configurations are created that map industry vertical classifications to vulnerable hardware and/or software stacks. These exemplary technology configurations are used as bases for comparison to subject technology configurations under evaluation. A comparison of a subject technology configuration parameters to parameters of the plurality of exemplary technology configurations can reveal similarities that indicate that the subject technology configuration is vulnerable one or more same threats that the exemplary technology configurations are known to be vulnerable to or that the subject technology configuration is susceptible to heightened cyber threat risk, based on historical cybersecurity event data.
机译:配置用于与网络威胁风险相关的预测功能的计算设备可访问历史网络安全事件数据,这些数据列出了过去针对不同行业垂直分类中特定公司的攻击。使用与每次攻击相关联的漏洞数据,通过指定与攻击相关联的易受攻击硬件和/或软件堆栈的元数据进行增强,创建了将行业垂直分类映射到易受攻击硬件和/或软件堆栈的示范性技术配置。这些示例性技术配置用作与评估中的主题技术配置进行比较的基础。将对象技术配置参数与多个示例性技术配置的参数进行比较可以揭示相似性,这些相似性表明对象技术配置易受攻击,一个或多个已知示例性技术配置易受攻击的相同威胁,或者对象技术配置易受攻击网络威胁风险,基于历史网络安全事件数据。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号