KR101691853B1 - 자동화된 자산 중요도 평가 - Google Patents
자동화된 자산 중요도 평가 Download PDFInfo
- Publication number
- KR101691853B1 KR101691853B1 KR1020157012730A KR20157012730A KR101691853B1 KR 101691853 B1 KR101691853 B1 KR 101691853B1 KR 1020157012730 A KR1020157012730 A KR 1020157012730A KR 20157012730 A KR20157012730 A KR 20157012730A KR 101691853 B1 KR101691853 B1 KR 101691853B1
- Authority
- KR
- South Korea
- Prior art keywords
- asset
- importance
- particular asset
- data
- computing environment
- Prior art date
Links
- 230000009471 action Effects 0.000 claims abstract description 11
- 238000000034 method Methods 0.000 claims description 56
- 238000004891 communication Methods 0.000 claims description 40
- 238000011156 evaluation Methods 0.000 claims description 33
- 230000004224 protection Effects 0.000 claims description 22
- 238000012360 testing method Methods 0.000 claims description 22
- 238000001514 detection method Methods 0.000 claims description 21
- 230000002265 prevention Effects 0.000 claims description 12
- 230000004044 response Effects 0.000 claims description 6
- 230000000694 effects Effects 0.000 claims description 4
- 230000006735 deficit Effects 0.000 claims 2
- 238000012502 risk assessment Methods 0.000 description 28
- 238000007726 management method Methods 0.000 description 13
- 230000008569 process Effects 0.000 description 13
- 238000010586 diagram Methods 0.000 description 9
- 238000012545 processing Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 6
- 230000008520 organization Effects 0.000 description 6
- 230000006399 behavior Effects 0.000 description 5
- 238000007689 inspection Methods 0.000 description 4
- 238000004590 computer program Methods 0.000 description 3
- 239000000203 mixture Substances 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 230000000644 propagated effect Effects 0.000 description 3
- 241000700605 Viruses Species 0.000 description 2
- 230000002155 anti-virotic effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 239000002131 composite material Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 239000000470 constituent Substances 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000000116 mitigating effect Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000013515 script Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/568—Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
도 2는 일 실시예에 따른 일 예의 중요도 평가 엔진을 포함하는 일 예의 시스템의 간략한 블록도이다.
도 3은 일 실시예에 따른 컴퓨팅 네트워크에서 일 예의 자산의 중요도 평가를 표현하는 간략한 블록도이다.
도 4는 일 실시예에 따른 컴퓨팅 환경에서 일 예의 중요도 평가를 예시하는 간략한 흐름도이다.
도 5는 일 실시예에 따른 컴퓨팅 환경에서 다른 예의 중요도 평가를 예시하는 간략한 흐름도이다.
도 6은 시스템의 적어도 일부 실시예와 연관된 일 예의 동작을 예시하는 간략한 플로우차트이다.
여러 도면에서 유사한 참조 부호 및 명칭은 유사한 구성요소를 나타낸다.
Claims (29)
- 컴퓨팅 환경 내 하나 이상의 유틸리티에 의해 수집된 데이터로부터 결정되는 상기 컴퓨팅 환경의 특정 자산(a particular asset)의 속성 세트를 식별하는 단계- 상기 속성 세트는 상기 특정 자산과 연관된 하나 이상의 사용자 및 상기 하나 이상의 사용자에 의한 상기 자산의 사용의 맥락(context)을 식별함 -와,
적어도 하나의 프로세서 디바이스를 이용하여, 상기 연관된 하나 이상의 사용자 및 상기 사용의 맥락에 적어도 부분적으로 기초하여 상기 특정 자산의 중요도 등급값을 자동 결정하는 단계- 상기 중요도 등급값은 상기 특정 자산의 손실이나 손상의 영향을 표시함 -와,
상기 결정된 중요도 등급값, 상기 특정 자산의 취약성을 식별하는 취약성 검출 데이터 및 상기 특정 자산에 배치된 대책을 식별하는 대책 검출 데이터로부터 상기 특정 자산에 대한 위험 측정(risk measure)을 계산하는 단계와
상기 특정 자산에 대한 상기 계산된 위험 측정에 적어도 부분적으로 기초하여 상기 특정 자산에 관련된 보안 행위(a security activity)가 수행되게 하는 단계를 포함하는
자산 중요도 평가 방법.
- 제 1 항에 있어서,
상기 데이터는 상기 특정 자산의 컴퓨팅 디바이스에 배포된 에이전트를 이용하여 수집되는
자산 중요도 평가 방법.
- 제 2 항에 있어서,
상기 특정 자산은 상기 컴퓨팅 디바이스에서 호스팅되는 데이터 구조 및 애플리케이션 중 하나를 포함하는
자산 중요도 평가 방법.
- 제 2 항에 있어서,
상기 특정 자산은 상기 컴퓨팅 디바이스를 포함하는
자산 중요도 평가 방법.
- 삭제
- 삭제
- 제 1 항에 있어서,
상기 데이터는 상기 특정 자산으로부터 원격에 있는 유틸리티를 이용하여 수집되는
자산 중요도 평가 방법.
- 제 7 항에 있어서,
상기 유틸리티는 상기 컴퓨팅 환경의 보안 툴 및 상기 컴퓨팅 환경의 네트워크 요소 중 적어도 하나를 포함하는
자산 중요도 평가 방법.
- 제 7 항에 있어서,
상기 데이터는 상기 원격에 있는 유틸리티 및 상기 특정 자산의 컴퓨팅 디바이스에 배포된 로컬 에이전트(local agent) 모두로부터 수집되는
자산 중요도 평가 방법.
- 제 1 항에 있어서,
상기 속성 세트는 상기 특정 자산과 관련하여 저장된 콘텐츠의 유형을 포함하는
자산 중요도 평가 방법.
- 제 1 항에 있어서,
상기 속성 세트는 상기 특정 자산과 연관된 애플리케이션의 유형을 포함하는
자산 중요도 평가 방법.
- 명령어가 저장되어 있는 적어도 하나의 머신 액세스 가능한 저장 매체로서,
상기 명령어는 머신에서 실행될 때, 상기 머신으로 하여금,
컴퓨팅 환경 내 하나 이상의 유틸리티에 의해 수집되는 데이터로부터 결정되는 상기 컴퓨팅 환경의 특정 자산의 속성 세트를 식별- 상기 속성 세트는 상기 특정 자산과 연관된 하나 이상의 사용자 및 상기 하나 이상의 사용자에 의한 상기 자산의 사용의 맥락을 식별 -하게 하고,
상기 연관된 하나 이상의 사용자 및 상기 사용의 맥락에 적어도 부분적으로 기초하여 상기 특정 자산의 중요도 등급값을 자동 결정- 상기 중요도 등급값은 상기 특정 자산의 손실이나 손상의 영향을 표시 -하게 하고,
상기 결정된 중요도 등급값, 상기 특정 자산의 취약성을 식별하는 취약성 검출 데이터 및 상기 특정 자산에 배치된 대책을 식별하는 대책 검출 데이터로부터 상기 특정 자산에 대한 위험 측정을 계산하게 하고,
상기 특정 자산에 대한 상기 계산된 위험 측정에 적어도 부분적으로 기초하여 상기 특정 자산에 관련된 보안 행위가 수행되게 하는
비 일시적 머신 액세스 가능한 저장 매체.
- 삭제
- 제 12 항에 있어서,
상기 보안 행위가 수행되게 하는 것은 상기 자동 결정된 중요도 등급값에 기초하여 상기 보안 행위의 우선순위를 결정하는 것을 포함하는
비 일시적 머신 액세스 가능한 저장 매체.
- 제 12 항에 있어서,
상기 중요도 등급값은 상기 특정 자산이 연루된 이벤트에 대응하여 결정되는
비 일시적 머신 액세스 가능한 저장 매체.
- 제 12 항에 있어서,
상기 중요도 등급값을 자동 결정하는 것은 상기 속성 세트가 상기 특정 자산의 중요도를 입증하는 사전-정의된 특성의 세트에 대응하는지 여부를 결정하는 것을 포함하는
비 일시적 머신 액세스 가능한 저장 매체.
- 제 16 항에 있어서,
상기 중요도 등급값을 자동 결정하는 것은 상기 특정 자산에 대해 검사 세트를 실행하는 것을 포함하며, 상기 검사 세트에서 각각의 검사는 자산이 상기 특성의 세트 중 하나 이상의 특정한 특성에 대응하는 속성을 포함하는지 여부를 결정하기 위해 사용되는
비 일시적 머신 액세스 가능한 저장 매체.
- 제 12 항에 있어서,
상기 데이터는 상기 특정 자산에 관련하여 모니터링되는 네트워크를 통한 통신을 표시하는 네트워크 데이터를 포함하는
비 일시적 머신 액세스 가능한 저장 매체.
- 제 18 항에 있어서,
상기 속성 세트는 상기 특정 자산에 관련하여 상기 네트워크를 통한 트래픽의 양을 포함하는
비 일시적 머신 액세스 가능한 저장 매체.
- 제 18 항에 있어서,
상기 속성 세트는 상기 모니터링되는 통신 중 하나 이상을 생성하는 컴퓨팅 환경 사용자의 식별을 포함하는
비 일시적 머신 액세스 가능한 저장 매체.
- 제 18 항에 있어서,
상기 속성 세트는 상기 모니터링되는 통신으로부터 결정되는 상기 특정 자산의 역할을 포함하는
비 일시적 머신 액세스 가능한 저장 매체.
- 제 18 항에 있어서,
상기 속성 세트는 상기 모니터링되는 통신에 포함된 콘텐츠의 유형을 포함하는
비 일시적 머신 액세스 가능한 저장 매체.
- 제 12 항에 있어서,
상기 속성 세트는 상기 특정 자산이 상기 컴퓨팅 환경 내에서 배포되는 방법과 관련한 상기 특정 자산의 상태를 포함하는
비 일시적 머신 액세스 가능한 저장 매체.
- 제 12 항에 있어서,
상기 속성 세트는 상기 특정 자산과 연관된 특정 컴퓨팅 환경 사용자의 식별을 포함하는
비 일시적 머신 액세스 가능한 저장 매체.
- 제 12 항에 있어서,
상기 속성 세트는 상기 특정 자산과 관련하여 배포된 보안 보호를 포함하는
비 일시적 머신 액세스 가능한 저장 매체.
- 제 25 항에 있어서,
상기 보안 보호는 데이터 손실 방지, 변동 제어 정책, 및 액세스 제어 중 적어도 하나를 포함하는
비 일시적 머신 액세스 가능한 저장 매체.
- 적어도 하나의 프로세서 디바이스와,
적어도 하나의 메모리 요소와,
중요도 평가 엔진을 포함하되,
상기 중요도 평가 엔진은 상기 적어도 하나의 프로세서 디바이스에 의해 실행될 때,
컴퓨팅 환경 내 하나 이상의 유틸리티에 의해 수집되는 데이터를 식별하고 - 상기 수집된 데이터는 상기 컴퓨팅 환경의 특정 자산에 관계 있음 -,
상기 수집된 데이터로부터, 상기 특정 자산의 속성 세트를 식별- 상기 속성 세트는 상기 특정 자산과 연관된 하나 이상의 사용자 및 상기 하나 이상의 사용자에 의한 상기 자산의 사용의 맥락을 식별 -하고,
상기 연관된 하나 이상의 사용자 및 상기 사용의 맥락에 적어도 부분적으로 기초하여 상기 특정 자산의 중요도 등급값을 자동 결정- 상기 중요도 등급값은 상기 특정 자산의 손실이나 손상의 영향을 표시 -하고,
상기 결정된 중요도 등급값, 상기 특정 자산의 취약성을 식별하는 취약성 검출 데이터 및 상기 특정 자산에 배치된 대책을 식별하는 대책 검출 데이터로부터 상기 특정 자산에 대한 위험 측정을 계산하게 하고,
상기 특정 자산에 대한 상기 계산된 위험 측정에 적어도 부분적으로 기초하여 상기 특정 자산에 관련된 보안 행위가 수행되게 하도록 구성되는
자산 중요도 평가 시스템.
- 제 27 항에 있어서,
상기 하나 이상의 유틸리티를 더 포함하되,
상기 유틸리티는 상기 자산의 컴퓨팅 디바이스에 배포된 적어도 하나의 에이전트 및 상기 컴퓨팅 디바이스로부터 원격 배치된 적어도 하나의 유틸리티를 포함하는
자산 중요도 평가 시스템.
- 제 27 항에 있어서,
검사 세트를 더 포함하되, 각각의 검사는, 중요도를 입증하는 것으로서 식별되는 하나 이상의 특정한 특성에 대응하는 속성을 자산이 포함하는지 여부를 결정하도록 구성되는
자산 중요도 평가 시스템.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/718,970 | 2012-12-18 | ||
US13/718,970 US9954883B2 (en) | 2012-12-18 | 2012-12-18 | Automated asset criticality assessment |
PCT/US2013/075980 WO2014100103A1 (en) | 2012-12-18 | 2013-12-18 | Automated asset criticality assessment |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20150070331A KR20150070331A (ko) | 2015-06-24 |
KR101691853B1 true KR101691853B1 (ko) | 2017-01-02 |
Family
ID=50932635
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020157012730A KR101691853B1 (ko) | 2012-12-18 | 2013-12-18 | 자동화된 자산 중요도 평가 |
Country Status (5)
Country | Link |
---|---|
US (4) | US9954883B2 (ko) |
EP (1) | EP2936374A4 (ko) |
KR (1) | KR101691853B1 (ko) |
CN (1) | CN104798079A (ko) |
WO (1) | WO2014100103A1 (ko) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20230076595A (ko) * | 2021-11-24 | 2023-05-31 | 고인구 | 빅데이터 기반의 취약보안 관리를 위한 보안 토탈 관리 시스템 및 보안 토탈 관리 방법 |
US11829387B2 (en) | 2021-05-27 | 2023-11-28 | Kyndryl, Inc. | Similarity based digital asset management |
Families Citing this family (192)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8549638B2 (en) | 2004-06-14 | 2013-10-01 | Fireeye, Inc. | System and method of containing computer worms |
US10749887B2 (en) * | 2011-04-08 | 2020-08-18 | Proofpoint, Inc. | Assessing security risks of users in a computing network |
US9558677B2 (en) | 2011-04-08 | 2017-01-31 | Wombat Security Technologies, Inc. | Mock attack cybersecurity training system and methods |
US9954883B2 (en) | 2012-12-18 | 2018-04-24 | Mcafee, Inc. | Automated asset criticality assessment |
US9361455B2 (en) | 2013-01-02 | 2016-06-07 | International Business Machines Corporation | Security management in a networked computing environment |
US10686819B2 (en) * | 2013-02-19 | 2020-06-16 | Proofpoint, Inc. | Hierarchical risk assessment and remediation of threats in mobile networking environment |
US20140278733A1 (en) * | 2013-03-15 | 2014-09-18 | Navin Sabharwal | Risk management methods and systems for enterprise processes |
US9912683B2 (en) * | 2013-04-10 | 2018-03-06 | The United States Of America As Represented By The Secretary Of The Army | Method and apparatus for determining a criticality surface of assets to enhance cyber defense |
US9300686B2 (en) | 2013-06-28 | 2016-03-29 | Fireeye, Inc. | System and method for detecting malicious links in electronic messages |
US9992230B1 (en) | 2013-09-27 | 2018-06-05 | Tripwire, Inc. | Assessing security control quality and state in an information technology infrastructure |
US9223985B2 (en) * | 2013-10-09 | 2015-12-29 | Sap Se | Risk assessment of changing computer system within a landscape |
US9696982B1 (en) * | 2013-11-05 | 2017-07-04 | Amazon Technologies, Inc. | Safe host deployment for a heterogeneous host fleet |
US9756074B2 (en) * | 2013-12-26 | 2017-09-05 | Fireeye, Inc. | System and method for IPS and VM-based detection of suspicious objects |
US20150237062A1 (en) * | 2014-02-14 | 2015-08-20 | Risk I/O, Inc. | Risk Meter For Vulnerable Computing Devices |
US8984643B1 (en) | 2014-02-14 | 2015-03-17 | Risk I/O, Inc. | Ordered computer vulnerability remediation reporting |
US20170053222A1 (en) * | 2014-02-19 | 2017-02-23 | Hewlett Packard Enterprise Development Lp | Role based assessment for an it management system |
US9338181B1 (en) * | 2014-03-05 | 2016-05-10 | Netflix, Inc. | Network security system with remediation based on value of attacked assets |
US10084813B2 (en) | 2014-06-24 | 2018-09-25 | Fireeye, Inc. | Intrusion prevention and remedy system |
US9398028B1 (en) | 2014-06-26 | 2016-07-19 | Fireeye, Inc. | System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers |
WO2016016885A1 (en) * | 2014-07-28 | 2016-02-04 | B. G. Negev Technologies And Applications Ltd., At Ben-Gurion University | Misuseability analysis for it infrastructure |
WO2016022705A1 (en) * | 2014-08-05 | 2016-02-11 | AttackIQ, Inc. | Cyber security posture validation platform |
US9614864B2 (en) * | 2014-10-09 | 2017-04-04 | Bank Of America Corporation | Exposure of an apparatus to a technical hazard |
US10171318B2 (en) | 2014-10-21 | 2019-01-01 | RiskIQ, Inc. | System and method of identifying internet-facing assets |
CN104618178B (zh) * | 2014-12-29 | 2018-01-30 | 北京奇安信科技有限公司 | 网站漏洞在线评估方法及装置 |
US11895138B1 (en) * | 2015-02-02 | 2024-02-06 | F5, Inc. | Methods for improving web scanner accuracy and devices thereof |
US20160301585A1 (en) * | 2015-04-13 | 2016-10-13 | defend7, Inc. | Real-time tracking and visibility into application communications and component interactions |
US20160315804A1 (en) * | 2015-04-27 | 2016-10-27 | iQuate Inc. | Method and system for unique enduring identification of a hardware or software entity within an it landscape |
EP3213209B1 (en) * | 2015-05-07 | 2019-01-30 | CyberArk Software Ltd. | Systems and methods for detecting and reacting to malicious activity in computer networks |
US20160381060A1 (en) * | 2015-06-23 | 2016-12-29 | Veracode, Inc. | Systems and methods for aggregating asset vulnerabilities |
US11282017B2 (en) * | 2015-07-11 | 2022-03-22 | RiskRecon Inc. | Systems and methods for monitoring information security effectiveness |
KR101744631B1 (ko) * | 2015-08-25 | 2017-06-20 | 주식회사 아이티스테이션 | 네트워크 보안 시스템 및 보안 방법 |
JP6536680B2 (ja) * | 2015-09-15 | 2019-07-03 | 日本電気株式会社 | 情報処理装置、情報処理方法、およびプログラム |
WO2017049045A1 (en) | 2015-09-16 | 2017-03-23 | RiskIQ, Inc. | Using hash signatures of dom objects to identify website similarity |
US9386037B1 (en) | 2015-09-16 | 2016-07-05 | RiskIQ Inc. | Using hash signatures of DOM objects to identify website similarity |
US10050998B1 (en) | 2015-12-30 | 2018-08-14 | Fireeye, Inc. | Malicious message analysis system |
US20220164840A1 (en) | 2016-04-01 | 2022-05-26 | OneTrust, LLC | Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design |
WO2017180057A1 (en) * | 2016-04-11 | 2017-10-19 | Certis Cisco Security Pte Ltd | System and method for threat incidents corroboration in discrete temporal reference using 3d abstract modelling |
US10860715B2 (en) * | 2016-05-26 | 2020-12-08 | Barracuda Networks, Inc. | Method and apparatus for proactively identifying and mitigating malware attacks via hosted web assets |
US11336697B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11727141B2 (en) | 2016-06-10 | 2023-08-15 | OneTrust, LLC | Data processing systems and methods for synching privacy-related user consent across multiple computing devices |
US11651104B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US11651106B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US10878127B2 (en) | 2016-06-10 | 2020-12-29 | OneTrust, LLC | Data subject access request processing systems and related methods |
US11341447B2 (en) | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Privacy management systems and methods |
US11354435B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for data testing to confirm data deletion and related methods |
US11188615B2 (en) | 2016-06-10 | 2021-11-30 | OneTrust, LLC | Data processing consent capture systems and related methods |
US11416590B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11544667B2 (en) | 2016-06-10 | 2023-01-03 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11410106B2 (en) | 2016-06-10 | 2022-08-09 | OneTrust, LLC | Privacy management systems and methods |
US10318761B2 (en) | 2016-06-10 | 2019-06-11 | OneTrust, LLC | Data processing systems and methods for auditing data request compliance |
US10846433B2 (en) | 2016-06-10 | 2020-11-24 | OneTrust, LLC | Data processing consent management systems and related methods |
US11227247B2 (en) | 2016-06-10 | 2022-01-18 | OneTrust, LLC | Data processing systems and methods for bundled privacy policies |
US11295316B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems for identity validation for consumer rights requests and related methods |
US11481710B2 (en) | 2016-06-10 | 2022-10-25 | OneTrust, LLC | Privacy management systems and methods |
US10909488B2 (en) | 2016-06-10 | 2021-02-02 | OneTrust, LLC | Data processing systems for assessing readiness for responding to privacy-related incidents |
US11636171B2 (en) | 2016-06-10 | 2023-04-25 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US11416109B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Automated data processing systems and methods for automatically processing data subject access requests using a chatbot |
US10909265B2 (en) | 2016-06-10 | 2021-02-02 | OneTrust, LLC | Application privacy scanning systems and related methods |
US11188862B2 (en) | 2016-06-10 | 2021-11-30 | OneTrust, LLC | Privacy management systems and methods |
US10284604B2 (en) | 2016-06-10 | 2019-05-07 | OneTrust, LLC | Data processing and scanning systems for generating and populating a data inventory |
US11403377B2 (en) | 2016-06-10 | 2022-08-02 | OneTrust, LLC | Privacy management systems and methods |
US12045266B2 (en) | 2016-06-10 | 2024-07-23 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11586700B2 (en) | 2016-06-10 | 2023-02-21 | OneTrust, LLC | Data processing systems and methods for automatically blocking the use of tracking tools |
US11222139B2 (en) | 2016-06-10 | 2022-01-11 | OneTrust, LLC | Data processing systems and methods for automatic discovery and assessment of mobile software development kits |
US11328092B2 (en) | 2016-06-10 | 2022-05-10 | OneTrust, LLC | Data processing systems for processing and managing data subject access in a distributed environment |
US10949565B2 (en) | 2016-06-10 | 2021-03-16 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11343284B2 (en) | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance |
US11222142B2 (en) | 2016-06-10 | 2022-01-11 | OneTrust, LLC | Data processing systems for validating authorization for personal data collection, storage, and processing |
US11366909B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11416589B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11461500B2 (en) | 2016-06-10 | 2022-10-04 | OneTrust, LLC | Data processing systems for cookie compliance testing with website scanning and related methods |
US11392720B2 (en) | 2016-06-10 | 2022-07-19 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11625502B2 (en) | 2016-06-10 | 2023-04-11 | OneTrust, LLC | Data processing systems for identifying and modifying processes that are subject to data subject access requests |
US11418492B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for using a data model to select a target data asset in a data migration |
US11438386B2 (en) | 2016-06-10 | 2022-09-06 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11562097B2 (en) | 2016-06-10 | 2023-01-24 | OneTrust, LLC | Data processing systems for central consent repository and related methods |
US10997318B2 (en) | 2016-06-10 | 2021-05-04 | OneTrust, LLC | Data processing systems for generating and populating a data inventory for processing data access requests |
US12118121B2 (en) | 2016-06-10 | 2024-10-15 | OneTrust, LLC | Data subject access request processing systems and related methods |
US11354434B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11301796B2 (en) | 2016-06-10 | 2022-04-12 | OneTrust, LLC | Data processing systems and methods for customizing privacy training |
US11475136B2 (en) | 2016-06-10 | 2022-10-18 | OneTrust, LLC | Data processing systems for data transfer risk identification and related methods |
US11134086B2 (en) | 2016-06-10 | 2021-09-28 | OneTrust, LLC | Consent conversion optimization systems and related methods |
US11520928B2 (en) | 2016-06-10 | 2022-12-06 | OneTrust, LLC | Data processing systems for generating personal data receipts and related methods |
US10592648B2 (en) | 2016-06-10 | 2020-03-17 | OneTrust, LLC | Consent receipt management systems and related methods |
US12136055B2 (en) | 2016-06-10 | 2024-11-05 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US10678945B2 (en) | 2016-06-10 | 2020-06-09 | OneTrust, LLC | Consent receipt management systems and related methods |
US12052289B2 (en) | 2016-06-10 | 2024-07-30 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11416798B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for providing training in a vendor procurement process |
US10740487B2 (en) | 2016-06-10 | 2020-08-11 | OneTrust, LLC | Data processing systems and methods for populating and maintaining a centralized database of personal data |
US10510031B2 (en) | 2016-06-10 | 2019-12-17 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US11366786B2 (en) * | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US10685140B2 (en) | 2016-06-10 | 2020-06-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US11294939B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US11675929B2 (en) | 2016-06-10 | 2023-06-13 | OneTrust, LLC | Data processing consent sharing systems and related methods |
US10574559B2 (en) * | 2016-11-10 | 2020-02-25 | Bank Of America Corporation | System for defining and implementing performance monitoring requirements for applications and hosted computing environment infrastructure |
US10387657B2 (en) * | 2016-11-22 | 2019-08-20 | Aon Global Operations Ltd (Singapore Branch) | Systems and methods for cybersecurity risk assessment |
US10880317B2 (en) * | 2016-12-27 | 2020-12-29 | Crypteia Networks S.A. | Systems and methods for cluster-based network threat detection |
US10649857B2 (en) * | 2017-01-04 | 2020-05-12 | International Business Machine Corporation | Risk measurement driven data protection strategy |
US10257220B2 (en) | 2017-01-30 | 2019-04-09 | Xm Cyber Ltd. | Verifying success of compromising a network node during penetration testing of a networked system |
US10068095B1 (en) | 2017-05-15 | 2018-09-04 | XM Cyber Ltd | Systems and methods for selecting a termination rule for a penetration testing campaign |
US10367846B2 (en) | 2017-11-15 | 2019-07-30 | Xm Cyber Ltd. | Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign |
US10122750B2 (en) | 2017-01-30 | 2018-11-06 | XM Cyber Ltd | Setting-up penetration testing campaigns |
AU2018212708A1 (en) * | 2017-01-30 | 2019-08-08 | Xm Cyber Ltd. | Penetration testing of a networked system |
US10686822B2 (en) | 2017-01-30 | 2020-06-16 | Xm Cyber Ltd. | Systems and methods for selecting a lateral movement strategy for a penetration testing campaign |
US10721254B2 (en) * | 2017-03-02 | 2020-07-21 | Crypteia Networks S.A. | Systems and methods for behavioral cluster-based network threat detection |
US10581802B2 (en) | 2017-03-16 | 2020-03-03 | Keysight Technologies Singapore (Sales) Pte. Ltd. | Methods, systems, and computer readable media for advertising network security capabilities |
EP3602377A1 (en) * | 2017-03-30 | 2020-02-05 | McAfee, LLC | Secure software defined storage |
US10013577B1 (en) | 2017-06-16 | 2018-07-03 | OneTrust, LLC | Data processing systems for identifying whether cookies contain personally identifying information |
US10534917B2 (en) | 2017-06-20 | 2020-01-14 | Xm Cyber Ltd. | Testing for risk of macro vulnerability |
WO2018234867A1 (en) * | 2017-06-23 | 2018-12-27 | Ganor Ido | CORPORATE CYBERSECURITY RISK MANAGEMENT AND RESOURCE PLANNING |
WO2019004928A1 (en) * | 2017-06-29 | 2019-01-03 | Certis Cisco Security Pte Ltd | AUTONOMOUS INCREASE SORTING PRIORITIZATION BY PERFORMANCE MODIFIER AND TIME-DECREASING PARAMETERS |
US10574684B2 (en) | 2017-07-09 | 2020-02-25 | Xm Cyber Ltd. | Locally detecting phishing weakness |
US10409582B1 (en) * | 2017-07-21 | 2019-09-10 | Jpmorgan Chase Bank, N.A. | Method and system for implementing a retail event management tool |
US10412112B2 (en) | 2017-08-31 | 2019-09-10 | Xm Cyber Ltd. | Time-tagged pre-defined scenarios for penetration testing |
US10447721B2 (en) | 2017-09-13 | 2019-10-15 | Xm Cyber Ltd. | Systems and methods for using multiple lateral movement strategies in penetration testing |
US10706155B1 (en) | 2017-09-28 | 2020-07-07 | Amazon Technologies, Inc. | Provision and execution of customized security assessments of resources in a computing environment |
US10643002B1 (en) * | 2017-09-28 | 2020-05-05 | Amazon Technologies, Inc. | Provision and execution of customized security assessments of resources in a virtual computing environment |
US10397304B2 (en) * | 2018-01-30 | 2019-08-27 | Excentus Corporation | System and method to standardize and improve implementation efficiency of user interface content |
EP3746891A4 (en) | 2018-01-31 | 2020-12-23 | Aon Risk Consultants, Inc. | SYSTEM AND PROCEDURES FOR EVALUATING THE VULNERABILITY AND PROVIDING RELATED SERVICES AND PRODUCTS FOR EFFICIENT RISK REDUCTION |
US10440044B1 (en) | 2018-04-08 | 2019-10-08 | Xm Cyber Ltd. | Identifying communicating network nodes in the same local network |
CN110598959A (zh) * | 2018-05-23 | 2019-12-20 | 中国移动通信集团浙江有限公司 | 一种资产风险评估方法、装置、电子设备及存储介质 |
US10922411B2 (en) | 2018-06-20 | 2021-02-16 | Malwarebytes Inc. | Intelligent event collection for cloud-based malware detection |
US10970396B2 (en) * | 2018-06-20 | 2021-04-06 | Malwarebytes Inc. | Intelligent event collection for rolling back an endpoint state in response to malware |
US10803202B2 (en) | 2018-09-07 | 2020-10-13 | OneTrust, LLC | Data processing systems for orphaned data identification and deletion and related methods |
US11544409B2 (en) | 2018-09-07 | 2023-01-03 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US10382473B1 (en) | 2018-09-12 | 2019-08-13 | Xm Cyber Ltd. | Systems and methods for determining optimal remediation recommendations in penetration testing |
US11258817B2 (en) * | 2018-10-26 | 2022-02-22 | Tenable, Inc. | Rule-based assignment of criticality scores to assets and generation of a criticality rules table |
US11374958B2 (en) * | 2018-10-31 | 2022-06-28 | International Business Machines Corporation | Security protection rule prediction and enforcement |
WO2020089698A1 (en) | 2018-11-04 | 2020-05-07 | Xm Cyber Ltd. | Using information about exportable data in penetration testing |
WO2020121078A1 (en) | 2018-12-13 | 2020-06-18 | Xm Cyber Ltd. | Systems and methods for dynamic removal of agents from nodes of penetration testing systems |
US10958677B2 (en) | 2018-12-18 | 2021-03-23 | At&T Intellectual Property I, L.P. | Risk identification for unlabeled threats in network traffic |
GB201820853D0 (en) * | 2018-12-20 | 2019-02-06 | Palantir Technologies Inc | Detection of vulnerabilities in a computer network |
EP3918770A4 (en) | 2019-01-31 | 2022-04-13 | Aon Risk Consultants, Inc. | SYSTEMS AND PROCEDURES FOR VULNERABILITY ASSESSMENT AND IDENTIFICATION OF REMEDY |
WO2020161532A1 (en) | 2019-02-06 | 2020-08-13 | Xm Cyber Ltd. | Taking privilege escalation into account in penetration testing campaigns |
US11283827B2 (en) | 2019-02-28 | 2022-03-22 | Xm Cyber Ltd. | Lateral movement strategy during penetration testing of a networked system |
US11206281B2 (en) | 2019-05-08 | 2021-12-21 | Xm Cyber Ltd. | Validating the use of user credentials in a penetration testing campaign |
JP7176632B2 (ja) * | 2019-06-18 | 2022-11-22 | 日本電信電話株式会社 | 評価装置、評価方法、及びプログラム |
US10637883B1 (en) | 2019-07-04 | 2020-04-28 | Xm Cyber Ltd. | Systems and methods for determining optimal remediation recommendations in penetration testing |
US11316883B2 (en) * | 2019-07-17 | 2022-04-26 | Bank Of America Corporation | Cybersecurity—operational resilience of computer networks |
US10880326B1 (en) | 2019-08-01 | 2020-12-29 | Xm Cyber Ltd. | Systems and methods for determining an opportunity for node poisoning in a penetration testing campaign, based on actual network traffic |
CN110460481B (zh) * | 2019-09-12 | 2022-02-25 | 南京经纬信安科技有限公司 | 一种网络关键资产的识别方法 |
US11533329B2 (en) | 2019-09-27 | 2022-12-20 | Keysight Technologies, Inc. | Methods, systems and computer readable media for threat simulation and threat mitigation recommendations |
RU2746101C2 (ru) | 2019-09-30 | 2021-04-07 | Акционерное общество "Лаборатория Касперского" | Система и способ определения устройств компьютерной сети с использованием правил инвентаризации |
EP3799383A1 (en) | 2019-09-30 | 2021-03-31 | AO Kaspersky Lab | System and method for using inventory rules to identify devices of a computer network |
US11363039B2 (en) * | 2019-10-25 | 2022-06-14 | Paypal, Inc. | Detection of data leaks using targeted scanning |
US11463478B2 (en) * | 2019-10-29 | 2022-10-04 | International Business Machines Corporation | Remediation strategy optimization for development, security and operations (DevSecOps) |
US11005878B1 (en) | 2019-11-07 | 2021-05-11 | Xm Cyber Ltd. | Cooperation between reconnaissance agents in penetration testing campaigns |
US11916949B2 (en) * | 2019-11-19 | 2024-02-27 | National Technology & Engineering Solutions Of Sandia, Llc | Internet of things and operational technology detection and visualization platform |
US11171835B2 (en) * | 2019-11-21 | 2021-11-09 | EMC IP Holding Company LLC | Automated generation of an information technology asset ontology |
KR102291142B1 (ko) * | 2019-11-27 | 2021-08-18 | 국방과학연구소 | 시스템 운용 상태 정보를 이용한 사이버 자산 피해 분석 장치, 방법, 기록 매체 및 컴퓨터 프로그램 |
US11283828B2 (en) * | 2020-01-17 | 2022-03-22 | International Business Machines Corporation | Cyber-attack vulnerability and propagation model |
US11575700B2 (en) | 2020-01-27 | 2023-02-07 | Xm Cyber Ltd. | Systems and methods for displaying an attack vector available to an attacker of a networked system |
IL273321A (en) * | 2020-03-16 | 2021-09-30 | Otorio Ltd | A system and method for reducing risk in an operational network |
US11582256B2 (en) | 2020-04-06 | 2023-02-14 | Xm Cyber Ltd. | Determining multiple ways for compromising a network node in a penetration testing campaign |
US20230300114A1 (en) * | 2020-04-21 | 2023-09-21 | Zscaler, Inc. | Endpoint Data Loss Prevention |
US11777979B2 (en) | 2020-05-11 | 2023-10-03 | Firecompass Technologies Pvt Ltd | System and method to perform automated red teaming in an organizational network |
US11363041B2 (en) | 2020-05-15 | 2022-06-14 | International Business Machines Corporation | Protecting computer assets from malicious attacks |
EP4179435B1 (en) | 2020-07-08 | 2024-09-04 | OneTrust LLC | Systems and methods for targeted data discovery |
CN111565201B (zh) * | 2020-07-15 | 2020-11-10 | 北京东方通科技股份有限公司 | 一种基于多属性的工业互联网安全评估方法及系统 |
EP4189569A1 (en) | 2020-07-28 | 2023-06-07 | OneTrust LLC | Systems and methods for automatically blocking the use of tracking tools |
US11503048B2 (en) * | 2020-07-30 | 2022-11-15 | Cisco Technology, Inc. | Prioritizing assets using security metrics |
WO2022032072A1 (en) | 2020-08-06 | 2022-02-10 | OneTrust, LLC | Data processing systems and methods for automatically redacting unstructured data from a data subject access request |
WO2022060860A1 (en) | 2020-09-15 | 2022-03-24 | OneTrust, LLC | Data processing systems and methods for detecting tools for the automatic blocking of consent requests |
WO2022061270A1 (en) | 2020-09-21 | 2022-03-24 | OneTrust, LLC | Data processing systems and methods for automatically detecting target data transfers and target data processing |
US20220108024A1 (en) * | 2020-10-02 | 2022-04-07 | Acentium Inc. | Systems and methods for reconnaissance of a computer environment |
US12032702B2 (en) | 2020-10-23 | 2024-07-09 | International Business Machines Corporation | Automated health-check risk assessment of computing assets |
WO2022099023A1 (en) | 2020-11-06 | 2022-05-12 | OneTrust, LLC | Systems and methods for identifying data processing activities based on data discovery results |
WO2022132831A1 (en) * | 2020-12-18 | 2022-06-23 | Hive Pro Inc. | Predictive vulnerability management analytics, orchestration, automation and remediation platform for computer systems. networks and devices |
US11637852B2 (en) * | 2021-01-04 | 2023-04-25 | Microsoft Technology Licensing, Llc | Internet-facing device identification |
US11687528B2 (en) | 2021-01-25 | 2023-06-27 | OneTrust, LLC | Systems and methods for discovery, classification, and indexing of data in a native computing system |
WO2022170047A1 (en) | 2021-02-04 | 2022-08-11 | OneTrust, LLC | Managing custom attributes for domain objects defined within microservices |
US20240111899A1 (en) | 2021-02-08 | 2024-04-04 | OneTrust, LLC | Data processing systems and methods for anonymizing data samples in classification analysis |
US11601464B2 (en) | 2021-02-10 | 2023-03-07 | OneTrust, LLC | Systems and methods for mitigating risks of third-party computing system functionality integration into a first-party computing system |
WO2022178089A1 (en) | 2021-02-17 | 2022-08-25 | OneTrust, LLC | Managing custom workflows for domain objects defined within microservices |
WO2022178219A1 (en) | 2021-02-18 | 2022-08-25 | OneTrust, LLC | Selective redaction of media content |
EP4305539A1 (en) | 2021-03-08 | 2024-01-17 | OneTrust, LLC | Data transfer discovery and analysis systems and related methods |
US12034755B2 (en) * | 2021-03-18 | 2024-07-09 | International Business Machines Corporation | Computationally assessing and remediating security threats |
US11562078B2 (en) | 2021-04-16 | 2023-01-24 | OneTrust, LLC | Assessing and managing computational risk involved with integrating third party computing functionality within a computing system |
US12153704B2 (en) | 2021-08-05 | 2024-11-26 | OneTrust, LLC | Computing platform for facilitating data exchange among computing environments |
CN113839817B (zh) * | 2021-09-23 | 2023-05-05 | 北京天融信网络安全技术有限公司 | 一种网络资产风险评估方法、装置及电子设备 |
US12095800B1 (en) * | 2021-10-28 | 2024-09-17 | Rapid7, Inc. | Automated assessment scheduling |
US11928221B2 (en) | 2021-11-29 | 2024-03-12 | Bank Of America Corporation | Source code clustering for automatically identifying false positives generated through static application security testing |
US11941115B2 (en) | 2021-11-29 | 2024-03-26 | Bank Of America Corporation | Automatic vulnerability detection based on clustering of applications with similar structures and data flows |
US11729081B2 (en) | 2022-01-20 | 2023-08-15 | International Business Machines Corporation | Enhancing software application hosting in a cloud environment |
CN119213434A (zh) * | 2022-04-29 | 2024-12-27 | 西门子股份公司 | 用于强化ot系统中的资产的方法、设备和装置以及存储介质和计算机程序产品 |
US11620142B1 (en) | 2022-06-03 | 2023-04-04 | OneTrust, LLC | Generating and customizing user interfaces for demonstrating functions of interactive user environments |
US12206800B1 (en) | 2022-06-21 | 2025-01-21 | Rapid7, Inc. | Event-driven assessment of network system assets |
US12170656B1 (en) | 2022-06-21 | 2024-12-17 | Rapid7, Inc. | Authenticated assessment of network system assets |
US11757923B1 (en) | 2022-10-11 | 2023-09-12 | Second Sight Data Discovery, Inc. | Apparatus and method for intelligent processing of cyber security risk data |
US11750643B1 (en) | 2022-10-11 | 2023-09-05 | Second Sight Data Discovery, Inc. | Apparatus and method for determining a recommended cyber-attack risk remediation action |
US20240143452A1 (en) * | 2022-10-27 | 2024-05-02 | Dell Products L.P. | Data catalog for dataset lifecycle management system for content-based data protection |
US12206700B1 (en) | 2022-11-01 | 2025-01-21 | Rapid7, Inc. | Asynchronous protocol for assessment of network system assets |
Family Cites Families (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6073142A (en) | 1997-06-23 | 2000-06-06 | Park City Group | Automated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments |
US5987610A (en) | 1998-02-12 | 1999-11-16 | Ameritech Corporation | Computer virus screening methods and systems |
US6460050B1 (en) | 1999-12-22 | 2002-10-01 | Mark Raymond Pace | Distributed content identification system |
US6901519B1 (en) | 2000-06-22 | 2005-05-31 | Infobahn, Inc. | E-mail virus protection system and method |
WO2002054325A2 (en) * | 2001-01-02 | 2002-07-11 | Trusecure Corporation | Object-oriented method, system and medium for risk management by creating inter-dependency between objects, criteria and metrics |
US7281270B2 (en) * | 2003-04-01 | 2007-10-09 | Lockheed Martin Corporation | Attack impact prediction system |
SG115533A1 (en) * | 2003-04-01 | 2005-10-28 | Maximus Consulting Pte Ltd | Risk control system |
US20070192867A1 (en) * | 2003-07-25 | 2007-08-16 | Miliefsky Gary S | Security appliances |
US8201257B1 (en) | 2004-03-31 | 2012-06-12 | Mcafee, Inc. | System and method of managing network security risks |
KR20060058186A (ko) | 2004-11-24 | 2006-05-29 | 이형원 | 정보기술 위험관리시스템 및 그 방법 |
US7278163B2 (en) * | 2005-02-22 | 2007-10-02 | Mcafee, Inc. | Security risk analysis system and method |
US8739278B2 (en) * | 2006-04-28 | 2014-05-27 | Oracle International Corporation | Techniques for fraud monitoring and detection using application fingerprinting |
US20080184131A1 (en) | 2007-01-31 | 2008-07-31 | Solar Turbines Inc. | Method for providing an asset criticality tool |
US7908660B2 (en) * | 2007-02-06 | 2011-03-15 | Microsoft Corporation | Dynamic risk management |
US8856315B2 (en) * | 2009-05-29 | 2014-10-07 | Verizon Patent And Licensing Inc. | Device classification system |
US8418229B2 (en) * | 2010-08-17 | 2013-04-09 | Bank Of America Corporation | Systems and methods for performing access entitlement reviews |
KR20120076661A (ko) | 2010-12-09 | 2012-07-09 | 한국전자통신연구원 | 정보자산 관리 장치, 서버, 에이전트 및 방법 |
US8621637B2 (en) * | 2011-01-10 | 2013-12-31 | Saudi Arabian Oil Company | Systems, program product and methods for performing a risk assessment workflow process for plant networks and systems |
CN103563302B (zh) | 2011-06-01 | 2016-09-14 | 惠普发展公司,有限责任合伙企业 | 网络资产信息管理 |
KR101292640B1 (ko) | 2011-06-03 | 2013-08-23 | 주식회사 제이컴정보 | 통합인증시스템과 연계된 웹 기반 위험관리시스템을 이용한 위험관리방법 |
US8997234B2 (en) * | 2011-07-27 | 2015-03-31 | Mcafee, Inc. | System and method for network-based asset operational dependence scoring |
US9141805B2 (en) * | 2011-09-16 | 2015-09-22 | Rapid7 LLC | Methods and systems for improved risk scoring of vulnerabilities |
US8856936B2 (en) * | 2011-10-14 | 2014-10-07 | Albeado Inc. | Pervasive, domain and situational-aware, adaptive, automated, and coordinated analysis and control of enterprise-wide computers, networks, and applications for mitigation of business and operational risks and enhancement of cyber security |
US8595845B2 (en) | 2012-01-19 | 2013-11-26 | Mcafee, Inc. | Calculating quantitative asset risk |
US8925092B1 (en) * | 2012-03-08 | 2014-12-30 | Amazon Technologies, Inc. | Risk assessment for software applications |
US20140137257A1 (en) * | 2012-11-12 | 2014-05-15 | Board Of Regents, The University Of Texas System | System, Method and Apparatus for Assessing a Risk of One or More Assets Within an Operational Technology Infrastructure |
US9106681B2 (en) * | 2012-12-17 | 2015-08-11 | Hewlett-Packard Development Company, L.P. | Reputation of network address |
US9954883B2 (en) | 2012-12-18 | 2018-04-24 | Mcafee, Inc. | Automated asset criticality assessment |
-
2012
- 2012-12-18 US US13/718,970 patent/US9954883B2/en active Active
-
2013
- 2013-12-18 KR KR1020157012730A patent/KR101691853B1/ko active IP Right Grant
- 2013-12-18 EP EP13865956.0A patent/EP2936374A4/en not_active Withdrawn
- 2013-12-18 WO PCT/US2013/075980 patent/WO2014100103A1/en active Application Filing
- 2013-12-18 CN CN201380060177.4A patent/CN104798079A/zh active Pending
-
2018
- 2018-04-23 US US15/959,946 patent/US10320830B2/en active Active
-
2019
- 2019-04-25 US US16/394,351 patent/US10735454B2/en active Active
-
2020
- 2020-06-23 US US16/909,647 patent/US11483334B2/en active Active
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11829387B2 (en) | 2021-05-27 | 2023-11-28 | Kyndryl, Inc. | Similarity based digital asset management |
KR20230076595A (ko) * | 2021-11-24 | 2023-05-31 | 고인구 | 빅데이터 기반의 취약보안 관리를 위한 보안 토탈 관리 시스템 및 보안 토탈 관리 방법 |
KR102540904B1 (ko) * | 2021-11-24 | 2023-06-08 | 고인구 | 빅데이터 기반의 취약보안 관리를 위한 보안 토탈 관리 시스템 및 보안 토탈 관리 방법 |
Also Published As
Publication number | Publication date |
---|---|
US9954883B2 (en) | 2018-04-24 |
US10320830B2 (en) | 2019-06-11 |
KR20150070331A (ko) | 2015-06-24 |
US11483334B2 (en) | 2022-10-25 |
CN104798079A (zh) | 2015-07-22 |
WO2014100103A1 (en) | 2014-06-26 |
US20180351988A1 (en) | 2018-12-06 |
US20190253450A1 (en) | 2019-08-15 |
US20140173739A1 (en) | 2014-06-19 |
EP2936374A1 (en) | 2015-10-28 |
US20200322372A1 (en) | 2020-10-08 |
US10735454B2 (en) | 2020-08-04 |
EP2936374A4 (en) | 2016-07-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101691853B1 (ko) | 자동화된 자산 중요도 평가 | |
US11928231B2 (en) | Dynamic multi-factor authentication | |
US12225042B2 (en) | System and method for user and entity behavioral analysis using network topology information | |
US11323484B2 (en) | Privilege assurance of enterprise computer network environments | |
US11539751B2 (en) | Data management platform | |
US20160127417A1 (en) | Systems, methods, and devices for improved cybersecurity | |
Kolevski et al. | Cloud computing data breaches a socio-technical review of literature | |
US20230336591A1 (en) | Centralized management of policies for network-accessible devices | |
KR20200071995A (ko) | 정보자산의 실시간 위협 대응 시스템 | |
Zenker et al. | A review of testing cloud security | |
Reddy et al. | Detecting and Preventing Unauthorized User Access to Cloud Services by CASBs | |
Chauhan | QUANTIFYING SECURITY IN PLATFORM AS A SERVICE USING MEAN FAILURE COST: A STAKEHOLDER’S PERSPECTIVE | |
CN115801620A (zh) | 一种终端安全管理系统及方法 | |
Atzeni et al. | An estimation of attack surface to evaluate network (in) security |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
PA0105 | International application |
Patent event date: 20150514 Patent event code: PA01051R01D Comment text: International Patent Application |
|
PA0201 | Request for examination | ||
PG1501 | Laying open of application | ||
E902 | Notification of reason for refusal | ||
PE0902 | Notice of grounds for rejection |
Comment text: Notification of reason for refusal Patent event date: 20160314 Patent event code: PE09021S01D |
|
E701 | Decision to grant or registration of patent right | ||
PE0701 | Decision of registration |
Patent event code: PE07011S01D Comment text: Decision to Grant Registration Patent event date: 20160927 |
|
GRNT | Written decision to grant | ||
PR0701 | Registration of establishment |
Comment text: Registration of Establishment Patent event date: 20161227 Patent event code: PR07011E01D |
|
PR1002 | Payment of registration fee |
Payment date: 20161228 End annual number: 3 Start annual number: 1 |
|
PG1601 | Publication of registration | ||
FPAY | Annual fee payment |
Payment date: 20191127 Year of fee payment: 4 |
|
PR1001 | Payment of annual fee |
Payment date: 20191127 Start annual number: 4 End annual number: 4 |
|
PR1001 | Payment of annual fee |
Payment date: 20201201 Start annual number: 5 End annual number: 5 |
|
PR1001 | Payment of annual fee |
Payment date: 20211129 Start annual number: 6 End annual number: 6 |
|
PR1001 | Payment of annual fee |
Payment date: 20241120 Start annual number: 9 End annual number: 9 |