首页> 外国专利> Method and system for cyber-security vulnerability detection and compliance measurement (CDCM)

Method and system for cyber-security vulnerability detection and compliance measurement (CDCM)

机译:网络安全漏洞检测和合规性测量的方法和系统

摘要

Method and System for Cyber-Security Vulnerability Detection and Compliance Measurement (CDCM) provides any entity, organization or individual with access to or possession of sensitive, confidential or secret information, defined as “protected information,” in digital format that is received, processed, stored or distributed by a computer, computer system or digital processing equipment with the capability to detect and respond to cyber security vulnerabilities and to measure compliance with cyber-security requirements as established by the Federal Security Information Management Act (FISMA) for the security of protected information and certain additional related desirable or mandatory cyber-security requirements. In one sample embodiment of the invention, the method utilizes a damage assessment function; a security assessment function; a security plan or planning function; a training management function; a response management function; a cyber-security management function; a scoring measurement function; and a review and analysis function; to establish a quantifiable and definitive numerical measurement of the relative compliance of a specific processing system, at a specific point in time, to a defined and established threshold value of performance, or compliance acceptance, and to provide, assemble and be capable of archiving the supporting parameters, status, states and analysis that is specifically associated with the numerical value which represents the specific processing system's state of compliance at the specified time and to utilize various intermediate values and parameters to manage and enhance the performance of the specific system thereby improving the systems compliance score and numerical performance measurement value.
机译:网络安全漏洞检测和合规性度量(CDCM)的方法和系统为任何实体,组织或个人提供访问或拥有敏感,机密或机密信息的权限,这些信息被定义为“受保护的信息”,以数字格式接收,处理由计算机,计算机系统或数字处理设备存储或分发的,具有检测和响应网络安全漏洞并衡量对联邦安全信息管理法案(FISMA)规定的网络安全要求的遵从性的能力,受保护的信息以及某些其他相关的理想或强制性网络安全要求。在本发明的一个示例实施例中,该方法利用了损害评估功能。安全评估职能;安全计划或计划功能;培训管理职能;响应管理功能;网络安全管理功能;评分测量功能;以及审查和分析职能;建立对特定处理系统在特定时间点相对于已定义和建立的性能或合规性接受阈值的相对合规性的量化和确定性的数值度量,并提供,组装并能够存档支持参数,状态,状态和分析,这些参数具体与代表特定处理系统在指定时间的依从状态的数值相关联,并利用各种中间值和参数来管理和增强特定系统的性能,从而改善系统符合性评分和数值性能测量值。

著录项

  • 公开/公告号US2005132225A1

    专利类型

  • 公开/公告日2005-06-16

    原文格式PDF

  • 申请/专利权人 GLENN GEARHART;

    申请/专利号US20030737503

  • 发明设计人 GLENN GEARHART;

    申请日2003-12-16

  • 分类号H04L9/32;H04L9/00;G06F11/30;G06F12/14;

  • 国家 US

  • 入库时间 2022-08-21 22:25:08

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号