Information technology security assessment system
A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
23.01.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system. Advantageously, the composite security score has a relatively high likelihood of corresponding to an internal audit score despite use of externally observable security characteristics. Also, the method and system may include use of multiple security characterizations all solely derived from externally observable characteristics of the third party computer system. |
---|---|
Bibliography: | Application Number: US202318461087 |