RULE-BASED ASSIGNMENT OF CRITICALITY SCORES TO ASSETS AND GENERATION OF A CRITICALITY RULES TABLE

In an embodiment, a management system obtains a criticality rules table that includes a plurality of rules mapped to corresponding criticality scores indicative of a level of risk in the event that an associated asset of a managed network is compromised by a third party. The one embodiment, the crit...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: EVERSON, Matthew Ray, SHERIDAN, Barry, DERAISON, Renaud, TAI, Wei, BETTINI, Anthony, GILCREEST, Vincent
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator EVERSON, Matthew Ray
SHERIDAN, Barry
DERAISON, Renaud
TAI, Wei
BETTINI, Anthony
GILCREEST, Vincent
description In an embodiment, a management system obtains a criticality rules table that includes a plurality of rules mapped to corresponding criticality scores indicative of a level of risk in the event that an associated asset of a managed network is compromised by a third party. The one embodiment, the criticality rules table is updated based upon machine learning and/or feedback from an operator of the managed network. In another embodiment, the criticality rules table is used to assign one or more criticality scores to one or more assets based on one or more attributes of one or more assets, and the criticality rules table.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2022150274A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2022150274A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2022150274A13</originalsourceid><addsrcrecordid>eNqNzDELwjAQhuEuDqL-hwPnQhsV52t6rYGYQO46OJUgcRIt1P-PBlzcnL7l-d5lEcNgqWyQqQVkNr07kxPwHehgxGi0Ri7A2gdiEJ8NCQO6FnpyFFCMd5njzyFXPx4bS-ticYv3OW2-uyq2HYk-lWl6jmme4jU90mscWFVK1YdKHfdY7_5Tb3A2NG8</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>RULE-BASED ASSIGNMENT OF CRITICALITY SCORES TO ASSETS AND GENERATION OF A CRITICALITY RULES TABLE</title><source>esp@cenet</source><creator>EVERSON, Matthew Ray ; SHERIDAN, Barry ; DERAISON, Renaud ; TAI, Wei ; BETTINI, Anthony ; GILCREEST, Vincent</creator><creatorcontrib>EVERSON, Matthew Ray ; SHERIDAN, Barry ; DERAISON, Renaud ; TAI, Wei ; BETTINI, Anthony ; GILCREEST, Vincent</creatorcontrib><description>In an embodiment, a management system obtains a criticality rules table that includes a plurality of rules mapped to corresponding criticality scores indicative of a level of risk in the event that an associated asset of a managed network is compromised by a third party. The one embodiment, the criticality rules table is updated based upon machine learning and/or feedback from an operator of the managed network. In another embodiment, the criticality rules table is used to assign one or more criticality scores to one or more assets based on one or more attributes of one or more assets, and the criticality rules table.</description><language>eng</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220512&amp;DB=EPODOC&amp;CC=US&amp;NR=2022150274A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,777,882,25545,76296</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20220512&amp;DB=EPODOC&amp;CC=US&amp;NR=2022150274A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>EVERSON, Matthew Ray</creatorcontrib><creatorcontrib>SHERIDAN, Barry</creatorcontrib><creatorcontrib>DERAISON, Renaud</creatorcontrib><creatorcontrib>TAI, Wei</creatorcontrib><creatorcontrib>BETTINI, Anthony</creatorcontrib><creatorcontrib>GILCREEST, Vincent</creatorcontrib><title>RULE-BASED ASSIGNMENT OF CRITICALITY SCORES TO ASSETS AND GENERATION OF A CRITICALITY RULES TABLE</title><description>In an embodiment, a management system obtains a criticality rules table that includes a plurality of rules mapped to corresponding criticality scores indicative of a level of risk in the event that an associated asset of a managed network is compromised by a third party. The one embodiment, the criticality rules table is updated based upon machine learning and/or feedback from an operator of the managed network. In another embodiment, the criticality rules table is used to assign one or more criticality scores to one or more assets based on one or more attributes of one or more assets, and the criticality rules table.</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNzDELwjAQhuEuDqL-hwPnQhsV52t6rYGYQO46OJUgcRIt1P-PBlzcnL7l-d5lEcNgqWyQqQVkNr07kxPwHehgxGi0Ri7A2gdiEJ8NCQO6FnpyFFCMd5njzyFXPx4bS-ticYv3OW2-uyq2HYk-lWl6jmme4jU90mscWFVK1YdKHfdY7_5Tb3A2NG8</recordid><startdate>20220512</startdate><enddate>20220512</enddate><creator>EVERSON, Matthew Ray</creator><creator>SHERIDAN, Barry</creator><creator>DERAISON, Renaud</creator><creator>TAI, Wei</creator><creator>BETTINI, Anthony</creator><creator>GILCREEST, Vincent</creator><scope>EVB</scope></search><sort><creationdate>20220512</creationdate><title>RULE-BASED ASSIGNMENT OF CRITICALITY SCORES TO ASSETS AND GENERATION OF A CRITICALITY RULES TABLE</title><author>EVERSON, Matthew Ray ; SHERIDAN, Barry ; DERAISON, Renaud ; TAI, Wei ; BETTINI, Anthony ; GILCREEST, Vincent</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2022150274A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2022</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>EVERSON, Matthew Ray</creatorcontrib><creatorcontrib>SHERIDAN, Barry</creatorcontrib><creatorcontrib>DERAISON, Renaud</creatorcontrib><creatorcontrib>TAI, Wei</creatorcontrib><creatorcontrib>BETTINI, Anthony</creatorcontrib><creatorcontrib>GILCREEST, Vincent</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>EVERSON, Matthew Ray</au><au>SHERIDAN, Barry</au><au>DERAISON, Renaud</au><au>TAI, Wei</au><au>BETTINI, Anthony</au><au>GILCREEST, Vincent</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>RULE-BASED ASSIGNMENT OF CRITICALITY SCORES TO ASSETS AND GENERATION OF A CRITICALITY RULES TABLE</title><date>2022-05-12</date><risdate>2022</risdate><abstract>In an embodiment, a management system obtains a criticality rules table that includes a plurality of rules mapped to corresponding criticality scores indicative of a level of risk in the event that an associated asset of a managed network is compromised by a third party. The one embodiment, the criticality rules table is updated based upon machine learning and/or feedback from an operator of the managed network. In another embodiment, the criticality rules table is used to assign one or more criticality scores to one or more assets based on one or more attributes of one or more assets, and the criticality rules table.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2022150274A1
source esp@cenet
subjects CALCULATING
COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title RULE-BASED ASSIGNMENT OF CRITICALITY SCORES TO ASSETS AND GENERATION OF A CRITICALITY RULES TABLE
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T20%3A05%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=EVERSON,%20Matthew%20Ray&rft.date=2022-05-12&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2022150274A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true