IL250288D0 - Misuseability analysis for it infrastructure - Google Patents

Misuseability analysis for it infrastructure

Info

Publication number
IL250288D0
IL250288D0 IL250288A IL25028817A IL250288D0 IL 250288 D0 IL250288 D0 IL 250288D0 IL 250288 A IL250288 A IL 250288A IL 25028817 A IL25028817 A IL 25028817A IL 250288 D0 IL250288 D0 IL 250288D0
Authority
IL
Israel
Prior art keywords
misuseability
infrastructure
analysis
Prior art date
Application number
IL250288A
Other languages
Hebrew (he)
Original Assignee
B G Negev Technologies And Applications Ltd At Ben Gurion Univ
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US201462029576P priority Critical
Priority to PCT/IL2015/050769 priority patent/WO2016016885A1/en
Application filed by B G Negev Technologies And Applications Ltd At Ben Gurion Univ filed Critical B G Negev Technologies And Applications Ltd At Ben Gurion Univ
Publication of IL250288D0 publication Critical patent/IL250288D0/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0635Risk analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/67Risk-dependent, e.g. selecting a security level depending on risk profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
IL250288A 2014-07-28 2017-01-25 Misuseability analysis for it infrastructure IL250288D0 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US201462029576P true 2014-07-28 2014-07-28
PCT/IL2015/050769 WO2016016885A1 (en) 2014-07-28 2015-07-27 Misuseability analysis for it infrastructure

Publications (1)

Publication Number Publication Date
IL250288D0 true IL250288D0 (en) 2017-03-30

Family

ID=55216845

Family Applications (1)

Application Number Title Priority Date Filing Date
IL250288A IL250288D0 (en) 2014-07-28 2017-01-25 Misuseability analysis for it infrastructure

Country Status (4)

Country Link
US (1) US10192057B2 (en)
EP (1) EP3175382A4 (en)
IL (1) IL250288D0 (en)
WO (1) WO2016016885A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10915638B2 (en) * 2018-05-16 2021-02-09 Target Brands Inc. Electronic security evaluator
US11030321B2 (en) 2018-10-02 2021-06-08 International Business Machines Corporation Processing and evaluating data based on associated device vulnerability

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2002243763A1 (en) * 2001-01-31 2002-08-12 Internet Security Systems, Inc. Method and system for configuring and scheduling security audits of a computer network
JP3948389B2 (en) * 2002-10-24 2007-07-25 富士ゼロックス株式会社 Communication analyzer
US8402546B2 (en) * 2008-11-19 2013-03-19 Microsoft Corporation Estimating and visualizing security risk in information technology systems
US8549649B2 (en) 2009-04-30 2013-10-01 Emc Corporation Systems and methods for sensitive data remediation
US8997234B2 (en) 2011-07-27 2015-03-31 Mcafee, Inc. System and method for network-based asset operational dependence scoring
US9954883B2 (en) * 2012-12-18 2018-04-24 Mcafee, Inc. Automated asset criticality assessment

Also Published As

Publication number Publication date
EP3175382A4 (en) 2017-12-20
WO2016016885A1 (en) 2016-02-04
US20170213038A1 (en) 2017-07-27
US10192057B2 (en) 2019-01-29
EP3175382A1 (en) 2017-06-07

Similar Documents

Publication Publication Date Title
HK1222906A1 (en) Vehicle-borne inspection system
HK1258539A1 (en) Micro-moment analysis
GB201402318D0 (en) Method for materials analysis
GB201413245D0 (en) ImAGE Analysis
ZA201608367B (en) Method for methylation analysis
GB201420859D0 (en) Tumour analysis
NO20161261A1 (en) Measurement system
PL3183174T3 (en) Pipetting system
GB201708360D0 (en) Methods for determining health risks
HUE053440T2 (en) Embryo sampling method
IL246889D0 (en) Method for measuring engagement
GB201615417D0 (en) Fluoometric analyzer
IL250288D0 (en) Misuseability analysis for it infrastructure
GB2539580B (en) Analysis device
GB201417447D0 (en) Improved immunoassay for pyrrolidinophenones
GB201416015D0 (en) Biomarker
GB2524130B (en) Analysing Apparatus
GB201402233D0 (en) Apparatus
NO20200265A1 (en) Piezoelektriske sensorer for geofysiske streamere
GB2542329B (en) Analysis Apparatus
NO20162064A1 (en) Measurement system
SG11201700015WA (en) Improved apparatus
PL409595A1 (en) Method for obtaining pseudofactin
HK1198459A2 (en) Connecting apparatus for construction
GB201420239D0 (en) Biomarker