20240056473. Determining the Exposure Level Of Vulnerabilities simplified abstract (GOOGLE LLC)

From WikiPatents
Jump to navigation Jump to search

Determining the Exposure Level Of Vulnerabilities

Organization Name

GOOGLE LLC

Inventor(s)

Sebastian Lekies of Zurich (CH)

Jean-Baptiste Cid of Zurich (CH)

Determining the Exposure Level Of Vulnerabilities - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240056473 titled 'Determining the Exposure Level Of Vulnerabilities

Simplified Explanation

The method described in the abstract involves scanning network-connected assets for vulnerabilities using different scanning privilege levels.

  • The method receives a scan request to scan a set of network-connected assets designated for a network scan.
  • Each network-connected asset is scanned at a network security scanner using a first scanning privilege level to determine if it has a vulnerability.
  • If a vulnerability is detected, the respective network-connected asset is scanned again at the network security scanner using a second scanning privilege level, which has lower access than the first scanning privilege level.
  • The exposure level of the vulnerability is determined based on the scans, and reported to the user of the respective network-connected asset.

Potential applications of this technology:

  • Network security management
  • Vulnerability assessment and remediation

Problems solved by this technology:

  • Efficient identification and mitigation of vulnerabilities in network-connected assets
  • Improved security posture of network infrastructure

Benefits of this technology:

  • Enhanced security monitoring and response capabilities
  • Streamlined vulnerability management process
  • Reduction of potential security breaches and data loss.


Original Abstract Submitted

a method includes receiving a scan request requesting to scan a set of network-connected assets designated for a network scan. for each respective network-connected asset, the method includes scanning, at a network security scanner using a first scanning privilege level, the respective network-connected asset. the method includes determining, based on the scan using the first scanning privilege level, whether the respective network-connected asset has a vulnerability. in response, the method includes scanning, at the network security scanner using a second scanning privilege level, the respective network-connected asset. the second scanning privilege level defines a lower level of access the network security scanner has than the first scanning privilege level. the method includes determining, based on the scans, an exposure level of the vulnerability. the method includes reporting the exposure level of the vulnerability to a user of the respective network-connected asset.