[go: up one dir, main page]

GB2544803B - Managing security risk in a computer network - Google Patents

Managing security risk in a computer network Download PDF

Info

Publication number
GB2544803B
GB2544803B GB1521047.9A GB201521047A GB2544803B GB 2544803 B GB2544803 B GB 2544803B GB 201521047 A GB201521047 A GB 201521047A GB 2544803 B GB2544803 B GB 2544803B
Authority
GB
United Kingdom
Prior art keywords
computer network
security risk
managing security
managing
risk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
GB1521047.9A
Other versions
GB2544803A (en
GB201521047D0 (en
Inventor
Kamiñski Jaroslaw
Madziar Michal
Grzybowski Szymon
Lipert Tomasz
Tasiemski Leszek
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WithSecure Oyj
Original Assignee
F Secure Oyj
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by F Secure Oyj filed Critical F Secure Oyj
Priority to GB1521047.9A priority Critical patent/GB2544803B/en
Publication of GB201521047D0 publication Critical patent/GB201521047D0/en
Publication of GB2544803A publication Critical patent/GB2544803A/en
Application granted granted Critical
Publication of GB2544803B publication Critical patent/GB2544803B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
GB1521047.9A 2015-11-30 2015-11-30 Managing security risk in a computer network Active GB2544803B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1521047.9A GB2544803B (en) 2015-11-30 2015-11-30 Managing security risk in a computer network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1521047.9A GB2544803B (en) 2015-11-30 2015-11-30 Managing security risk in a computer network

Publications (3)

Publication Number Publication Date
GB201521047D0 GB201521047D0 (en) 2016-01-13
GB2544803A GB2544803A (en) 2017-05-31
GB2544803B true GB2544803B (en) 2020-12-09

Family

ID=55177413

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1521047.9A Active GB2544803B (en) 2015-11-30 2015-11-30 Managing security risk in a computer network

Country Status (1)

Country Link
GB (1) GB2544803B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115632823A (en) * 2022-09-27 2023-01-20 杭州安恒信息技术股份有限公司 Threat intelligence perception method, device, computer equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080005555A1 (en) * 2002-10-01 2008-01-03 Amnon Lotem System, method and computer readable medium for evaluating potential attacks of worms
US20120185945A1 (en) * 2004-03-31 2012-07-19 Mcafee, Inc. System and method of managing network security risks
US20130074188A1 (en) * 2011-09-16 2013-03-21 Rapid7 LLC. Methods and systems for improved risk scoring of vulnerabilities
US20130340084A1 (en) * 2009-11-30 2013-12-19 Sven Schrecker Asset risk analysis
US20150237062A1 (en) * 2014-02-14 2015-08-20 Risk I/O, Inc. Risk Meter For Vulnerable Computing Devices

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080005555A1 (en) * 2002-10-01 2008-01-03 Amnon Lotem System, method and computer readable medium for evaluating potential attacks of worms
US20120185945A1 (en) * 2004-03-31 2012-07-19 Mcafee, Inc. System and method of managing network security risks
US20130340084A1 (en) * 2009-11-30 2013-12-19 Sven Schrecker Asset risk analysis
US20130074188A1 (en) * 2011-09-16 2013-03-21 Rapid7 LLC. Methods and systems for improved risk scoring of vulnerabilities
US20150237062A1 (en) * 2014-02-14 2015-08-20 Risk I/O, Inc. Risk Meter For Vulnerable Computing Devices

Also Published As

Publication number Publication date
GB2544803A (en) 2017-05-31
GB201521047D0 (en) 2016-01-13

Similar Documents

Publication Publication Date Title
IL289426B (en) Method and device for managing security in a computer network
IL278880A (en) Systems and methods for organizing devices in a policy hierarchy
EP3162017A4 (en) Security in software defined network
GB201605194D0 (en) Energy management in a network
EP3067815C0 (en) Access relationships in a computer system
ZA201902904B (en) Enabling multiple numerologies in a network
SG11201707454QA (en) Network management
GB2533101B (en) Distributing a network access policy
GB201711062D0 (en) Secure data management techniques
GB2556816B (en) Network security based on proximity
IL253178B (en) Monitoring traffic in a computer network
GB2531677B (en) A network security system
GB201522546D0 (en) Power management in a power over data network
GB2533384B (en) Network security broker
GB201520736D0 (en) Dynamically linking information in a network
GB2539100B (en) Preventing security threats in a computer network
ZA201702039B (en) Trust management in transaction systems
ZA201509306B (en) Inventory management
SG11201703872VA (en) Infeasibility management in e-sourcing systems
GB2544803B (en) Managing security risk in a computer network
GB2527130B (en) Deploying software in a computer network
GB201512306D0 (en) Preventing browser-originating attacks in a local area network
GB201418850D0 (en) Improvements in building management systems
GB201505443D0 (en) Managing a network
GB201523162D0 (en) Data network management