Software nomenclature system for security vulnerability management

Systems and methods for securing a computer system are described herein. The systems and methods, which are computer-implemented, involve receiving, by a computing device, a name of a software vulnerability. The computing device measures a lexical similarity distance between the vulnerability name a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Singh, Govind Preet, Singh, Navjot, Malhotra, Baljeet Singh, Mahrous, Hesham, Kung, Shiu, Shan, Justine
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Systems and methods for securing a computer system are described herein. The systems and methods, which are computer-implemented, involve receiving, by a computing device, a name of a software vulnerability. The computing device measures a lexical similarity distance between the vulnerability name and each name in a list of names of software systems and components of the computer system. The computing device further identifies the software system and component names that are within a predetermined similarity distance of the vulnerability name as corresponding to software systems and components having the software vulnerability. Once the vulnerabilities are detected and mapped to corresponding software systems and components, the systems and methods can generate derivative works (e.g., reports, charts, and other derivative data) for further data processing, storage or analysis by different stake holders and/or other computing devices.