18495027. Determining the Exposure Level Of Vulnerabilities simplified abstract (GOOGLE LLC)

From WikiPatents
Jump to navigation Jump to search

Determining the Exposure Level Of Vulnerabilities

Organization Name

GOOGLE LLC

Inventor(s)

Sebastian Lekies of Zurich (CH)

Jean-Baptiste Cid of Zurich (CH)

Determining the Exposure Level Of Vulnerabilities - A simplified explanation of the abstract

This abstract first appeared for US patent application 18495027 titled 'Determining the Exposure Level Of Vulnerabilities

Simplified Explanation

The method described in the patent application involves scanning network-connected assets for vulnerabilities using different scanning privilege levels.

  • The method starts by receiving a scan request to scan a set of network-connected assets designated for a network scan.
  • Each network-connected asset is scanned using a first scanning privilege level to determine if it has a vulnerability.
  • If a vulnerability is detected, the asset is scanned again using a second scanning privilege level, which has lower access than the first level.
  • The exposure level of the vulnerability is determined based on the scans.
  • The exposure level of the vulnerability is reported to the user of the respective network-connected asset.

---

      1. Potential Applications
  • Network security scanning tools
  • Vulnerability assessment software
  • Cybersecurity solutions
      1. Problems Solved
  • Efficiently identifying vulnerabilities in network-connected assets
  • Providing accurate exposure levels of vulnerabilities
  • Enhancing network security measures
      1. Benefits
  • Improved network security
  • Timely detection and mitigation of vulnerabilities
  • Enhanced protection against cyber threats


Original Abstract Submitted

A method includes receiving a scan request requesting to scan a set of network-connected assets designated for a network scan. For each respective network-connected asset, the method includes scanning, at a network security scanner using a first scanning privilege level, the respective network-connected asset. The method includes determining, based on the scan using the first scanning privilege level, whether the respective network-connected asset has a vulnerability. In response, the method includes scanning, at the network security scanner using a second scanning privilege level, the respective network-connected asset. The second scanning privilege level defines a lower level of access the network security scanner has than the first scanning privilege level. The method includes determining, based on the scans, an exposure level of the vulnerability. The method includes reporting the exposure level of the vulnerability to a user of the respective network-connected asset.