Methods for using organizational behavior for risk ratings
Among other things, traces are received of activities of an online user who is associated with an entity. By analysis of the traces a security state of the entity is inferred. Also, a map is generated between (a) technical assets that contribute to security characteristics of respective entities and...
Saved in:
Main Authors | , , , , , |
---|---|
Format | Patent |
Language | English |
Published |
22.09.2020
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Among other things, traces are received of activities of an online user who is associated with an entity. By analysis of the traces a security state of the entity is inferred. Also, a map is generated between (a) technical assets that contribute to security characteristics of respective entities and (b) the identities of the entities that are associated with the respective technical assets. At least part of the generating of the map is done automatically. A user can be engaged to assist in the generating of the map by presenting to the user through a user interface (a) data about the technical assets of entities and (b) an interactive tool for associating the technical assets with the identities of the entities. |
---|---|
Bibliography: | Application Number: US201916405121 |