Processing

Please wait...

Settings

Settings

Goto Application

1. WO2013160765 - CYBER SECURITY ANALYZER

Publication Number WO/2013/160765
Publication Date 31.10.2013
International Application No. PCT/IB2013/001106
International Filing Date 23.04.2013
IPC
G06F 21/57 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
G06F 21/40 2013.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
30Authentication, i.e. establishing the identity or authorisation of security principals
31User authentication
40by quorum, i.e. whereby two or more security principals are required
CPC
G06F 21/40
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
30Authentication, i.e. establishing the identity or authorisation of security principals
31User authentication
40by quorum, i.e. whereby two or more security principals are required
G06F 21/577
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
577Assessing vulnerabilities and evaluating computer system security
G06F 2221/2145
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
2221Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
G06Q 10/0635
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
10Administration; Management
06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
063Operations research or analysis
0635Risk analysis
H04L 63/1433
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
14for detecting or protecting against malicious traffic
1433Vulnerability analysis
Applicants
  • ABB TECHNOLOGY AG [CH]/[CH]
Inventors
  • MACY, David, P.
  • BOO, Leif, Patrik
  • POPPENBERG, Rainer
  • PHILLIPS, Bryan, R.
Agents
  • POSTIGLIONE, Ferruccio
Priority Data
13/453,34423.04.2012US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) CYBER SECURITY ANALYZER
(FR) ANALYSEUR DE CYBERSÉCURITÉ
Abstract
(EN)
An overall cyber security risk diagram is generated from a hierarchy of determined KPI's by combining a Procedures and Protocol KPI determined from values assigned to answers to questions presented to organization personnel implementing a control systems, with a Group Security Policies KPI that is determined from system- wide policy information and system settings of the automation system by an automated processing device tool, and a Computer Settings KPI that is determined from device setting data collected by the automated processing device tool that is relevant to cyber security from each of a plurality of individual system devices of the automation control system. The device setting data comprises service areas unique to each device that are not assessable by review of the domain data collected and used to determine the Group Security Policies KPI. Each level of the hierarchy of determined KPI's may be used to generate a representation of relative risk of a cyber-security attribute.
(FR)
Un diagramme général de risques de cybersécurité est généré à partir d'une hiérarchie de KPI déterminés en combinant un KPI « Procédures et protocole » déterminé à partir des valeurs affectées aux réponses à des questions présentées au personnel d'une organisation mettant en œuvre un système de commande, avec un KPI « Politiques de sécurité du groupe » déterminé à partir des informations sur la politique à l'échelle du système et des paramètres du système d'automatisation par un outil de dispositif de traitement automatique, et un KPI « Paramètres de l'ordinateur » déterminé à partir de données de configuration de dispositif collectées par l'outil de dispositif de traitement automatique qui est pertinent pour la cybersécurité à partir de chaque dispositif d'une pluralité de dispositifs système individuels du système de contrôle d'automatisation. Les données de configuration de dispositif comprennent des zones de services spécifiques à chaque dispositif qui ne peuvent pas être évaluées par examen des données de domaines collectées et utilisées pour déterminer le KPI « Politiques de sécurité du groupe ». Chaque niveau de la hiérarchie des KPI déterminés peut être utilisé pour générer une représentation du risque relatif d'un attribut de cybersécurité.
Latest bibliographic data on file with the International Bureau