System for generation and reuse of resource-centric threat modeling templates and identifying controls for securing technology resources

a technology for threat modeling and technology resources, applied in the field of system for generation and reuse of resourcecentric threat modeling templates and identifying controls for securing technology resources, can solve problems such as loss types, personal files, account details, and damage to both the entity and the customer involved

Active Publication Date: 2017-11-16
BANK OF AMERICA CORP
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0007]In some embodiments, the one or more controls are configured to be regulated to monitor access to the internal resource via at least one of the one or more threat vectors, thereby reducing the exposure score associated with each of the one or more threat vectors.
[0009]In some embodiments, the module is further configured to cause the at least one processor to: determine one or more additional controls; determine a cost associated with the incorporation of each of the one or more additional controls; determine that the cost associated with the incorporation of each of the one or more additional controls is lower than the difference between the exposure score associated with the at least one of the one or more threat vectors before implementation of the one or more additional controls and after the implementation of the one or more additional controls; based on determining that the cost associated with the incorporation of each of the one or more additional controls is lower than the difference between the exposure score associated with the at least one of the one or more threat vectors before implementation of the one or more additional controls and after the implementation of the one or more additional controls, initiate, via the established communicable link, a recommendation interface for display on the user device, the recommendation interface comprising the one or more additional controls; electronically receive, via the established communication link, a user selection of at least one of the one or more additional controls; and incorporate the one or more additional controls selected by the user.

Problems solved by technology

Breaches in technology resources typically result in these types of losses against customer and client information, payment information, personal files, account details, which can be detrimental to both the entity and the customer involved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System for generation and reuse of resource-centric threat modeling templates and identifying controls for securing technology resources
  • System for generation and reuse of resource-centric threat modeling templates and identifying controls for securing technology resources
  • System for generation and reuse of resource-centric threat modeling templates and identifying controls for securing technology resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018]Embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all, embodiments of the invention are shown. Indeed, the invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will satisfy applicable legal requirements. Like numbers refer to elements throughout. For clarity, non-essential elements may have been omitted from some of the drawing.

[0019]It will be appreciated that certain features of the invention, which are, for clarity, described in the context of separate embodiments, may also be provided in combination in a single embodiment. Conversely, various features of the invention, which are, for brevity, described in the context of a single embodiment, may also be provided separately or in any suitable sub-combination or as suitable in any other describ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Systems, computer program products, and methods are described herein for creating reusable resource-centric threat models and identifying controls for securing resources within a network. The present invention is configured to determine that an internal resource in a network requires protection from unauthorized external access; electronically receive information associated with the internal resource within the network; determine one or more threat vectors associated with the internal resource; electronically retrieve from a controls library, a control template associated with a resource category matching the resource category of the internal resource; and apply the control template to the internal resource.

Description

BACKGROUND[0001]With the growth in the Internet, securing technology resources has become an integral part of computer and information. Typically, securing technology resources includes measures adopted to avoid loss in the form of confidentiality, integrity, and availability of these resources. Breaches in technology resources typically result in these types of losses against customer and client information, payment information, personal files, account details, which can be detrimental to both the entity and the customer involved. Threat modeling is a systematic approach to ensure that the technology resources are protected against all possible threat vectors.BRIEF SUMMARY[0002]The following presents a simplified summary of one or more embodiments of the present invention, in order to provide a basic understanding of such embodiments. This summary is not an extensive overview of all contemplated embodiments, and is intended to neither identify key or critical elements of all embodi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06
CPCH04L63/105H04L63/14H04L63/10G06F21/6209G06F21/62G06F21/554G06F21/577H04L63/1408
Inventor YU, SOUNILSLOANE, BRANDON MATTHEW
Owner BANK OF AMERICA CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products