International business machines corporation (20240220628). HOLISTIC EVALUATION OF VULNERABILITIES IN A VULNERABILITY CHAIN simplified abstract

From WikiPatents
Jump to navigation Jump to search

HOLISTIC EVALUATION OF VULNERABILITIES IN A VULNERABILITY CHAIN

Organization Name

international business machines corporation

Inventor(s)

Nikki Elyse Robinson of Davidsonville MD (US)

Leigh Chase of Andover (GB)

Efran Himel of Cambridge MA (US)

Carter Hottovy of Austin TX (US)

HOLISTIC EVALUATION OF VULNERABILITIES IN A VULNERABILITY CHAIN - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240220628 titled 'HOLISTIC EVALUATION OF VULNERABILITIES IN A VULNERABILITY CHAIN

The abstract describes a method that involves searching for vulnerability chain data in a local database using a database query based on a description string associated with a new vulnerability. The search result obtained includes a plurality of linked vulnerabilities forming a vulnerability chain. The method further includes identifying a vulnerability characteristic of a linked vulnerability in the chain, generating a modified version of the vulnerability chain by adding the new vulnerability, assigning an updated vulnerability score to the new vulnerability based on the identified characteristic, and updating the local database with the new vulnerability chain and updated score.

  • The method involves searching for vulnerability chain data in a local database using a database query based on a description string associated with a new vulnerability.
  • The search result obtained includes a plurality of linked vulnerabilities forming a vulnerability chain.
  • A vulnerability characteristic of a linked vulnerability in the chain is identified.
  • A modified version of the vulnerability chain is generated by adding the new vulnerability.
  • An updated vulnerability score is assigned to the new vulnerability based on the identified characteristic.
  • The local database is updated with the new vulnerability chain and updated score.

Potential Applications: - Cybersecurity systems - Vulnerability management tools - Risk assessment software

Problems Solved: - Efficient identification and management of vulnerabilities - Enhancing cybersecurity measures - Streamlining vulnerability assessment processes

Benefits: - Improved security posture - Enhanced risk mitigation - Streamlined vulnerability management

Commercial Applications: Title: "Enhancing Cybersecurity Measures with Advanced Vulnerability Management Technology" This technology can be utilized by cybersecurity companies to offer enhanced vulnerability management solutions to their clients, improving overall security measures and risk mitigation strategies in various industries.

Prior Art: Readers can explore prior art related to vulnerability management systems, database queries for cybersecurity, and vulnerability scoring methodologies to gain a deeper understanding of the technological advancements in this field.

Frequently Updated Research: Stay updated on the latest advancements in vulnerability management systems, cybersecurity databases, and risk assessment tools to ensure the most effective implementation of this technology.

Questions about Vulnerability Chain Data: 1. How does the method determine the vulnerability characteristic of a linked vulnerability in the chain? The method identifies the vulnerability characteristic based on the description string associated with the new vulnerability and the linked vulnerabilities in the chain.

2. What are the key benefits of updating the local database with the new vulnerability chain and updated vulnerability score? Updating the database ensures that the latest vulnerability information is available for risk assessment and mitigation strategies, ultimately enhancing overall cybersecurity measures.


Original Abstract Submitted

an embodiment includes invoking a search of vulnerability chain data of a local database using a database query to obtain a search result, where the database query is based on a description string associated with a new vulnerability, and where the search result comprises a plurality of linked vulnerabilities that collectively form a vulnerability chain. the embodiment also includes identifying a vulnerability characteristic of a linked vulnerability of the plurality of linked vulnerabilities in the vulnerability chain. the embodiment also includes generating, as a new vulnerability chain, a modified version of the vulnerability chain by appending the new vulnerability to the vulnerability chain. the embodiment also includes assigning an updated vulnerability score to the new vulnerability based at least in part on the identified vulnerability characteristic of the linked vulnerability. the embodiment also includes updating the local database to include the new vulnerability chain and the updated vulnerability score.