GB2544803B - Managing security risk in a computer network - Google Patents
Managing security risk in a computer network Download PDFInfo
- Publication number
- GB2544803B GB2544803B GB1521047.9A GB201521047A GB2544803B GB 2544803 B GB2544803 B GB 2544803B GB 201521047 A GB201521047 A GB 201521047A GB 2544803 B GB2544803 B GB 2544803B
- Authority
- GB
- United Kingdom
- Prior art keywords
- computer network
- security risk
- managing security
- managing
- risk
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB1521047.9A GB2544803B (en) | 2015-11-30 | 2015-11-30 | Managing security risk in a computer network |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB1521047.9A GB2544803B (en) | 2015-11-30 | 2015-11-30 | Managing security risk in a computer network |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| GB201521047D0 GB201521047D0 (en) | 2016-01-13 |
| GB2544803A GB2544803A (en) | 2017-05-31 |
| GB2544803B true GB2544803B (en) | 2020-12-09 |
Family
ID=55177413
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB1521047.9A Active GB2544803B (en) | 2015-11-30 | 2015-11-30 | Managing security risk in a computer network |
Country Status (1)
| Country | Link |
|---|---|
| GB (1) | GB2544803B (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115632823A (en) * | 2022-09-27 | 2023-01-20 | 杭州安恒信息技术股份有限公司 | Threat intelligence perception method, device, computer equipment and storage medium |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080005555A1 (en) * | 2002-10-01 | 2008-01-03 | Amnon Lotem | System, method and computer readable medium for evaluating potential attacks of worms |
| US20120185945A1 (en) * | 2004-03-31 | 2012-07-19 | Mcafee, Inc. | System and method of managing network security risks |
| US20130074188A1 (en) * | 2011-09-16 | 2013-03-21 | Rapid7 LLC. | Methods and systems for improved risk scoring of vulnerabilities |
| US20130340084A1 (en) * | 2009-11-30 | 2013-12-19 | Sven Schrecker | Asset risk analysis |
| US20150237062A1 (en) * | 2014-02-14 | 2015-08-20 | Risk I/O, Inc. | Risk Meter For Vulnerable Computing Devices |
-
2015
- 2015-11-30 GB GB1521047.9A patent/GB2544803B/en active Active
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080005555A1 (en) * | 2002-10-01 | 2008-01-03 | Amnon Lotem | System, method and computer readable medium for evaluating potential attacks of worms |
| US20120185945A1 (en) * | 2004-03-31 | 2012-07-19 | Mcafee, Inc. | System and method of managing network security risks |
| US20130340084A1 (en) * | 2009-11-30 | 2013-12-19 | Sven Schrecker | Asset risk analysis |
| US20130074188A1 (en) * | 2011-09-16 | 2013-03-21 | Rapid7 LLC. | Methods and systems for improved risk scoring of vulnerabilities |
| US20150237062A1 (en) * | 2014-02-14 | 2015-08-20 | Risk I/O, Inc. | Risk Meter For Vulnerable Computing Devices |
Also Published As
| Publication number | Publication date |
|---|---|
| GB2544803A (en) | 2017-05-31 |
| GB201521047D0 (en) | 2016-01-13 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| IL289426B (en) | Method and device for managing security in a computer network | |
| IL278880A (en) | Systems and methods for organizing devices in a policy hierarchy | |
| EP3162017A4 (en) | Security in software defined network | |
| GB201605194D0 (en) | Energy management in a network | |
| EP3067815C0 (en) | Access relationships in a computer system | |
| ZA201902904B (en) | Enabling multiple numerologies in a network | |
| SG11201707454QA (en) | Network management | |
| GB2533101B (en) | Distributing a network access policy | |
| GB201711062D0 (en) | Secure data management techniques | |
| GB2556816B (en) | Network security based on proximity | |
| IL253178B (en) | Monitoring traffic in a computer network | |
| GB2531677B (en) | A network security system | |
| GB201522546D0 (en) | Power management in a power over data network | |
| GB2533384B (en) | Network security broker | |
| GB201520736D0 (en) | Dynamically linking information in a network | |
| GB2539100B (en) | Preventing security threats in a computer network | |
| ZA201702039B (en) | Trust management in transaction systems | |
| ZA201509306B (en) | Inventory management | |
| SG11201703872VA (en) | Infeasibility management in e-sourcing systems | |
| GB2544803B (en) | Managing security risk in a computer network | |
| GB2527130B (en) | Deploying software in a computer network | |
| GB201512306D0 (en) | Preventing browser-originating attacks in a local area network | |
| GB201418850D0 (en) | Improvements in building management systems | |
| GB201505443D0 (en) | Managing a network | |
| GB201523162D0 (en) | Data network management |