摘要:
According to certain embodiments, a cyber threat analysis system generates a network model of a network infrastructure that is used by an organization, assigns a weighting value to each of a plurality of network elements of the network infrastructure according to a relative importance of the each network element to the organization, and generates an attack vector according to a determined vulnerability of the network infrastructure. The attack vector represents one or more illicit actions that may be performed to compromise the network infrastructure. The system may simulate, using a network modeling tool, the attack vector on the network model to determine one or more resulting ramifications of one or more of the plurality of network elements due to the attack vector, and determine a criticality level of the attack vector according to the weighting value of the one or more network elements.
摘要:
According to one embodiment, a system for enforcing physical access control and logical access control may include a physical access control system, a logical access control system, a location detection system, and a convergence system. The convergence system may be communicatively coupled to the physical access control system, the logical access control system, and the location detection system and configured to: (i) receive information from the physical access control system regarding a physical access credential; (ii) receive information from the logical access control system regarding a logical access credential; (iii) receive information from the location detection system regarding a location of a location detection tag; and (iv) based on analysis of information regarding the physical access credential, information regarding the logical access credential, and the information regarding the location of the location detection tag, determine the approximate location of a person.
摘要:
A method for enforcing physical access control and logical access control may include: (i) controlling access of a person to a physical location based on a physical access credential associated with the person provided to a physical access control system; (ii) controlling access of the person to an information system and an enterprise service based on a logical access credential associated with the person provided to a logical access control system; (iii) receiving information from the physical access control system regarding the physical access credential; (iv) receiving information from the logical access control system regarding the logical access credential; (v) determining an approximate location of the person based on the physical access credential and the logical access credential; and (vi) blocking unauthorized access between the physical access control system and the logical access control system by a first firewall.