发明名称 COMPUTER ASSET VULNERABILITIES
摘要 Methods, systems, and apparatus, including computer programs encoded on computer storage media, for determining a network path between computer assets. One of the methods includes receiving an asset topology that includes an identifier for each computer-related asset that may be an entry point for an attack simulation, receiving threat data that identifies vulnerabilities of computer-related assets, determining a first computer-related asset that may be an entry point for an attack simulation, identifying one or more first vulnerabilities of the first computer-related asset, determining a path from the first computer-related asset to a second computer-related asset, determining one or more second vulnerabilities of the second computer-related asset, determining a probability that the second computer-related asset will be compromised by an adversary, and determining a change to the asset topology to reduce the probability that the second computer-related asset will be compromised by an adversary. Page 1 of 7 - -1 I D cj, I I~l I I -I
申请公布号 AU2016216520(A1) 申请公布日期 2017.03.02
申请号 AU20160216520 申请日期 2016.08.15
申请人 Accenture Global Services Limited 发明人 HOVOR, Elvis;MULCHANDANI, Shaan;CARVER, Matthew
分类号 G06F3/06;H04L29/06 主分类号 G06F3/06
代理机构 代理人
主权项
地址