RULE-BASED ASSIGNMENT OF CRITICALITY SCORES TO ASSETS AND GENERATION OF A CRITICALITY RULES TABLE
In an embodiment, a management system obtains a criticality rules table that includes a plurality of rules mapped to corresponding criticality scores indicative of a level of risk in the event that an associated asset of a managed network is compromised by a third party. The one embodiment, the crit...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | EVERSON, Matthew Ray SHERIDAN, Barry DERAISON, Renaud TAI, Wei BETTINI, Anthony GILCREEST, Vincent |
description | In an embodiment, a management system obtains a criticality rules table that includes a plurality of rules mapped to corresponding criticality scores indicative of a level of risk in the event that an associated asset of a managed network is compromised by a third party. The one embodiment, the criticality rules table is updated based upon machine learning and/or feedback from an operator of the managed network. In another embodiment, the criticality rules table is used to assign one or more criticality scores to one or more assets based on one or more attributes of one or more assets, and the criticality rules table. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2022150274A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2022150274A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2022150274A13</originalsourceid><addsrcrecordid>eNqNzDELwjAQhuEuDqL-hwPnQhsV52t6rYGYQO46OJUgcRIt1P-PBlzcnL7l-d5lEcNgqWyQqQVkNr07kxPwHehgxGi0Ri7A2gdiEJ8NCQO6FnpyFFCMd5njzyFXPx4bS-ticYv3OW2-uyq2HYk-lWl6jmme4jU90mscWFVK1YdKHfdY7_5Tb3A2NG8</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>RULE-BASED ASSIGNMENT OF CRITICALITY SCORES TO ASSETS AND GENERATION OF A CRITICALITY RULES TABLE</title><source>esp@cenet</source><creator>EVERSON, Matthew Ray ; SHERIDAN, Barry ; DERAISON, Renaud ; TAI, Wei ; BETTINI, Anthony ; GILCREEST, Vincent</creator><creatorcontrib>EVERSON, Matthew Ray ; SHERIDAN, Barry ; DERAISON, Renaud ; TAI, Wei ; BETTINI, Anthony ; GILCREEST, Vincent</creatorcontrib><description>In an embodiment, a management system obtains a criticality rules table that includes a plurality of rules mapped to corresponding criticality scores indicative of a level of risk in the event that an associated asset of a managed network is compromised by a third party. The one embodiment, the criticality rules table is updated based upon machine learning and/or feedback from an operator of the managed network. In another embodiment, the criticality rules table is used to assign one or more criticality scores to one or more assets based on one or more attributes of one or more assets, and the criticality rules table.</description><language>eng</language><subject>CALCULATING ; COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2022</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20220512&DB=EPODOC&CC=US&NR=2022150274A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,777,882,25545,76296</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20220512&DB=EPODOC&CC=US&NR=2022150274A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>EVERSON, Matthew Ray</creatorcontrib><creatorcontrib>SHERIDAN, Barry</creatorcontrib><creatorcontrib>DERAISON, Renaud</creatorcontrib><creatorcontrib>TAI, Wei</creatorcontrib><creatorcontrib>BETTINI, Anthony</creatorcontrib><creatorcontrib>GILCREEST, Vincent</creatorcontrib><title>RULE-BASED ASSIGNMENT OF CRITICALITY SCORES TO ASSETS AND GENERATION OF A CRITICALITY RULES TABLE</title><description>In an embodiment, a management system obtains a criticality rules table that includes a plurality of rules mapped to corresponding criticality scores indicative of a level of risk in the event that an associated asset of a managed network is compromised by a third party. The one embodiment, the criticality rules table is updated based upon machine learning and/or feedback from an operator of the managed network. In another embodiment, the criticality rules table is used to assign one or more criticality scores to one or more assets based on one or more attributes of one or more assets, and the criticality rules table.</description><subject>CALCULATING</subject><subject>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2022</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNzDELwjAQhuEuDqL-hwPnQhsV52t6rYGYQO46OJUgcRIt1P-PBlzcnL7l-d5lEcNgqWyQqQVkNr07kxPwHehgxGi0Ri7A2gdiEJ8NCQO6FnpyFFCMd5njzyFXPx4bS-ticYv3OW2-uyq2HYk-lWl6jmme4jU90mscWFVK1YdKHfdY7_5Tb3A2NG8</recordid><startdate>20220512</startdate><enddate>20220512</enddate><creator>EVERSON, Matthew Ray</creator><creator>SHERIDAN, Barry</creator><creator>DERAISON, Renaud</creator><creator>TAI, Wei</creator><creator>BETTINI, Anthony</creator><creator>GILCREEST, Vincent</creator><scope>EVB</scope></search><sort><creationdate>20220512</creationdate><title>RULE-BASED ASSIGNMENT OF CRITICALITY SCORES TO ASSETS AND GENERATION OF A CRITICALITY RULES TABLE</title><author>EVERSON, Matthew Ray ; SHERIDAN, Barry ; DERAISON, Renaud ; TAI, Wei ; BETTINI, Anthony ; GILCREEST, Vincent</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2022150274A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2022</creationdate><topic>CALCULATING</topic><topic>COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>EVERSON, Matthew Ray</creatorcontrib><creatorcontrib>SHERIDAN, Barry</creatorcontrib><creatorcontrib>DERAISON, Renaud</creatorcontrib><creatorcontrib>TAI, Wei</creatorcontrib><creatorcontrib>BETTINI, Anthony</creatorcontrib><creatorcontrib>GILCREEST, Vincent</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>EVERSON, Matthew Ray</au><au>SHERIDAN, Barry</au><au>DERAISON, Renaud</au><au>TAI, Wei</au><au>BETTINI, Anthony</au><au>GILCREEST, Vincent</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>RULE-BASED ASSIGNMENT OF CRITICALITY SCORES TO ASSETS AND GENERATION OF A CRITICALITY RULES TABLE</title><date>2022-05-12</date><risdate>2022</risdate><abstract>In an embodiment, a management system obtains a criticality rules table that includes a plurality of rules mapped to corresponding criticality scores indicative of a level of risk in the event that an associated asset of a managed network is compromised by a third party. The one embodiment, the criticality rules table is updated based upon machine learning and/or feedback from an operator of the managed network. In another embodiment, the criticality rules table is used to assign one or more criticality scores to one or more assets based on one or more attributes of one or more assets, and the criticality rules table.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2022150274A1 |
source | esp@cenet |
subjects | CALCULATING COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | RULE-BASED ASSIGNMENT OF CRITICALITY SCORES TO ASSETS AND GENERATION OF A CRITICALITY RULES TABLE |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-19T20%3A05%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=EVERSON,%20Matthew%20Ray&rft.date=2022-05-12&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2022150274A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |