International business machines corporation (20240114046). PRIORITIZATION OF ATTACK TECHNIQUES AGAINST AN ORGANIZATION simplified abstract

From WikiPatents
Jump to navigation Jump to search

PRIORITIZATION OF ATTACK TECHNIQUES AGAINST AN ORGANIZATION

Organization Name

international business machines corporation

Inventor(s)

Constantin Mircea Adam of Norwalk CT (US)

Muhammed Fatih Bulut of Auburndale MA (US)

Steven Ocepek of Cuyahoga Falls OH (US)

PRIORITIZATION OF ATTACK TECHNIQUES AGAINST AN ORGANIZATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240114046 titled 'PRIORITIZATION OF ATTACK TECHNIQUES AGAINST AN ORGANIZATION

Simplified Explanation

The patent application relates to a system for prioritizing cyber security events based on risk factors.

  • The system includes an attack prioritization engine that ranks security events according to risk.
  • A mapping component links vulnerabilities to attack techniques.
  • A calculation component aggregates scores for attack techniques.
  • An attack surface component ranks attack techniques based on aggregated scores.
  • The mapping component also maps security events to attack techniques.

Potential Applications

This technology can be applied in various industries such as finance, healthcare, and government to prioritize cyber security events and allocate resources effectively.

Problems Solved

This technology helps organizations identify and address high-risk cyber security events promptly, reducing the likelihood of successful cyber attacks and minimizing potential damage.

Benefits

The system enhances overall cyber security posture by prioritizing security events based on risk factors, allowing organizations to focus on addressing the most critical threats first.

Potential Commercial Applications

Potential commercial applications of this technology include offering cyber security services to businesses, developing security software solutions, and providing consulting services to improve cyber security strategies.

Possible Prior Art

One possible prior art could be the use of machine learning algorithms to prioritize cyber security events based on risk factors. Another could be the mapping of vulnerabilities to attack techniques to enhance threat detection and response capabilities.

Unanswered Questions

How does the system handle real-time security events and adapt to new threats?

The patent abstract does not provide details on the system's ability to handle real-time security events and adapt to emerging cyber threats.

What types of cyber security events are prioritized by the system?

The abstract does not specify the specific types of cyber security events that the system prioritizes based on risk factors.


Original Abstract Submitted

one or more systems, devices, computer program products and/or computer-implemented methods provided herein relate to prioritization of attack techniques and cyber security events. according to an embodiment, an attack prioritization engine can receive security events, train an artificial intelligence model to rank respective cyber security events as a function of risk, and output a prioritization of security events to address. a mapping component can map asset vulnerabilities to attack techniques. a calculation component can calculate and aggregate scores for respective attack techniques. an attack surface component can extract features from the aggregation of scores to rank attack techniques and determine an attack surface. the mapping component can further map security events to the attack techniques.