METHOD FOR RISK ANALYSIS USING INFORMATION ASSET MODELLING
    7.
    发明申请
    METHOD FOR RISK ANALYSIS USING INFORMATION ASSET MODELLING 审中-公开
    使用信息资产建模的风险分析方法

    公开(公告)号:US20090099885A1

    公开(公告)日:2009-04-16

    申请号:US11941209

    申请日:2007-11-16

    IPC分类号: G06Q10/00

    CPC分类号: G06Q10/06

    摘要: A method for risk analysis using information asset modeling. The method has the steps of: (a) identifying an information asset which uses or provides a network service; (b) identifying a threat on the information asset through a computer network; (c) identifying a vulnerability of the information asset; (d) calculating an AL (attack likelihood) by using a CVSS (Common Vulnerability Scoring System) score obtained by converting a severity caused by a success of an attack on the vulnerability into a standardized value; (e) computing the value of the information asset so as to calculate an IM (impact analysis); and (f) multiplying the calculated AL and IM so as to determine an RL (risk level) for the information asset.

    摘要翻译: 一种利用信息资产建模进行风险分析的方法。 该方法具有以下步骤:(a)识别使用或提供网络服务的信息资产; (b)通过计算机网络识别信息资产的威胁; (c)确定信息资产的脆弱性; (d)通过使用通过将由脆弱性攻击的成功引起的严重性转化为标准化值而获得的CVSS(通用漏洞评分系统)得分来计算AL(攻击可能性); (e)计算信息资产的价值以计算IM(影响分析); 和(f)将所计算的AL和IM相乘以便确定信息资产的RL(风险水平)。

    System Integration Method Based on System Entity Structure
    8.
    发明申请
    System Integration Method Based on System Entity Structure 审中-公开
    基于系统实体结构的系统集成方法

    公开(公告)号:US20080092207A1

    公开(公告)日:2008-04-17

    申请号:US11553227

    申请日:2006-10-26

    IPC分类号: H04L9/32

    CPC分类号: G06N5/00 H04L63/00

    摘要: Disclosed is a system integration method based on a system entity structure (SES). The method comprises steps of (a) analyzing an integration target system to extract a technology attribute and to represent the integration target system as a system entity structure (SES); and (b) carrying out a pruning operation for constitution elements of the integration target system represented as the system entity structure (SES) in the step (a), in consideration of the technology attribute extracted in the step (a), an environmental factor and a pruning rule, which being a basis for selection of constitutional technological elements. The invention is particularly effective for an integration target system having various element technologies such as information security system.

    摘要翻译: 公开了一种基于系统实体结构(SES)的系统集成方法。 该方法包括以下步骤:(a)分析集成目标系统以提取技术属性并将整合目标系统表示为系统实体结构(SES); 和(b)考虑到在步骤(a)中提取的技术属性,对步骤(a)中表示为系统实体结构(SES)的整合目标系统的构成要素进行修剪操作,环境因素 和修剪规则,这是选择宪法技术要素的基础。 本发明对于具有信息安全系统等各种要素技术的集成对象系统特别有效。

    HYBRID NETWORK DISCOVERY METHOD FOR DETECTING CLIENT APPLICATIONS
    9.
    发明申请
    HYBRID NETWORK DISCOVERY METHOD FOR DETECTING CLIENT APPLICATIONS 审中-公开
    用于检测客户应用程序的混合网络发现方法

    公开(公告)号:US20090122721A1

    公开(公告)日:2009-05-14

    申请号:US11941203

    申请日:2007-11-16

    IPC分类号: H04L12/26

    摘要: A hybrid network discovery method for detecting client applications. The method has the steps of: (a) applying test traffic packets to a network which is to be measured, and analyzing responses so as to check target nodes; (b) transmitting a protocol request packet to each of the checked target nodes; and (c) when the URL of the header of the protocol request packet coincides with a site for a specific application of the target node, extracting the URL and the IP address of the target node.

    摘要翻译: 一种用于检测客户端应用程序的混合网络发现方法。 该方法具有以下步骤:(a)将测试业务分组应用于要测量的网络,并分析响应以检查目标节点; (b)向每个所检查的目标节点发送协议请求分组; 和(c)当协议请求分组的报头的URL与目标节点的特定应用的站点一致时,提取目标节点的URL和IP地址。

    SECURITY RISK EVALUATION METHOD FOR EFFECTIVE THREAT MANAGEMENT
    10.
    发明申请
    SECURITY RISK EVALUATION METHOD FOR EFFECTIVE THREAT MANAGEMENT 审中-公开
    有效威胁管理的安全风险评估方法

    公开(公告)号:US20090106843A1

    公开(公告)日:2009-04-23

    申请号:US11941193

    申请日:2007-11-16

    IPC分类号: H04L9/00

    CPC分类号: H04L63/1433

    摘要: Provided is a security risk evaluation method for threat management. According to the present invention, new threats or vulnerabilities for a network which should be protected (target network) are collected, and a threat management environment is assessed by checking whether or not to apply attack-attempt detection rules and vulnerability assessment rules for assets related to the threats or vulnerabilities. Based on the assessment result, the range and level of response are previously checked and complemented, and corresponding risk evaluation is provided. Therefore, the threat management environment can be managed effectively.

    摘要翻译: 提供威胁管理的安全风险评估方法。 根据本发明,收集应当保护的网络(目标网络)的新的威胁或漏洞,并通过检查是否应用攻击尝试检测规则和资产相关的漏洞评估规则来评估威胁管理环境 威胁或漏洞。 根据评估结果,对检测范围和响应水平进行了检查和补充,并提供了相应的风险评估。 因此,可以有效管理威胁管理环境。