ELTA SYSTEMS LTD. (20240340303). METHOD OF CYBER SECURITY AND SYSTEM THEREOF simplified abstract

From WikiPatents
Jump to navigation Jump to search

METHOD OF CYBER SECURITY AND SYSTEM THEREOF

Organization Name

ELTA SYSTEMS LTD.

Inventor(s)

Noam Krakover of Ramat HaSharon (IL)

Camila Edry of Ashdod (IL)

METHOD OF CYBER SECURITY AND SYSTEM THEREOF - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240340303 titled 'METHOD OF CYBER SECURITY AND SYSTEM THEREOF

The abstract describes a computerized cyber security system that generates a consolidated risk score for analyzing vulnerabilities to cyber risks in multiple entities. The system scans a set of IP addresses, identifies risks, extracts risk criticality scores, determines misconfiguration scores, maps IP addresses to entities of interest, and provides criticality weights for both IP addresses and entities.

  • The system scans a first set of IP addresses to identify risks and extract corresponding risk criticality scores.
  • It determines misconfiguration scores for each IP address.
  • It maps a second set of IP addresses to an entity of interest and provides criticality weights for the IP addresses.
  • It also provides an entity criticality weight associated with the entity of interest.

Potential Applications: - Cyber security risk assessment for organizations - Vulnerability analysis for network infrastructure - Prioritizing security measures based on risk scores

Problems Solved: - Lack of consolidated risk assessment for multiple entities - Difficulty in prioritizing cyber security measures - Inefficient vulnerability analysis processes

Benefits: - Enhanced understanding of cyber risks - Improved decision-making for security measures - Efficient allocation of resources for risk mitigation

Commercial Applications: Title: "Integrated Cyber Security Risk Assessment System" This technology can be used by cybersecurity firms to offer comprehensive risk assessment services to organizations. It can also be integrated into existing security software to enhance vulnerability analysis capabilities.

Questions about the technology: 1. How does the system determine the criticality weights for IP addresses and entities? 2. What factors are considered in calculating the consolidated risk score for an entity?

Frequently Updated Research: Researchers are constantly working on improving the accuracy and efficiency of cyber security risk assessment systems. Stay updated on the latest advancements in this field to ensure optimal protection against cyber threats.


Original Abstract Submitted

a computerized cyber security system for generating a consolidated risk score of an entity, usable for analyzing the vulnerabilities of plurality of entities to cyber risks. the system is configured to determine a first set of ip addresses for scanning and then scan the first set of ip addresses, and for each ip address identify a risk and extract corresponding risk criticality score, and determining a misconfiguration score. the system is further configured to map a second set of ip addresses an entity of interest and provide ip address criticality weights associated with the second set of ip addresses. the system is further configured to provide an entity criticality weight associated with the entity of interest.