17823923. MULTI-LAYERED GRAPH MODELING FOR SECURITY RISK ASSESSMENT simplified abstract (International Business Machines Corporation)
MULTI-LAYERED GRAPH MODELING FOR SECURITY RISK ASSESSMENT
Organization Name
International Business Machines Corporation
Inventor(s)
Sandhya Koteshwara of White Plains NY (US)
Lars Schneidenbach of Bedford Hills NY (US)
Eun Kyung Lee of Bedford Corners NY (US)
MULTI-LAYERED GRAPH MODELING FOR SECURITY RISK ASSESSMENT - A simplified explanation of the abstract
This abstract first appeared for US patent application 17823923 titled 'MULTI-LAYERED GRAPH MODELING FOR SECURITY RISK ASSESSMENT
Simplified Explanation
The abstract describes a method for analyzing the security risk of a system architecture by identifying hardware and software components, generating a multi-layered graph based on these components, extracting properties from the graph, computing security metrics, and quantifying the security risk.
- Identifying hardware and software components of a system architecture
- Generating a multi-layered graph based on the components
- Extracting properties from the graph
- Computing security metrics based on the properties
- Quantifying the security risk of the system architecture
Potential Applications
This technology can be applied in various industries such as cybersecurity, network security, and system architecture design.
Problems Solved
This technology helps in identifying and quantifying security risks in system architectures, allowing for proactive measures to be taken to mitigate these risks.
Benefits
- Improved understanding of system architecture security - Proactive identification of security risks - Enhanced security measures based on quantified metrics
Original Abstract Submitted
One embodiment of the invention provides a method comprising identifying hardware and software components of a system architecture, and generating a multi-layered graph based on the hardware and software components. The multi-layered graph includes a hardware layer representing a lowest level of hardware architecture of the system architecture. The method further comprises extracting one or more properties of the multi-layered graph, computing one or more security metrics based on the one or more properties, and quantifying a security risk of the system architecture based on the one or more security metrics.