Gestion interactive de risque de securite

Interaktives sicherheitsrisikomanagement

Interactive security risk management

Abstract

The present invention includes computer implemented methods and computer apparatus for managing security risk by setting a hierarchical relationship between two or more elements comprising an entity and receiving an indication of a security risk associated with one or more of the elements. A selection of an element can also be received and a description of the security risk can be transmitted, as it relates to the element selected and based upon the hierarchical relationship of elements and the indication of the security risk. A list of resources associated with the element selected can also be generated. Elements can include, for example, a geographic area delineated according to at least one of: a continent, a national boundary; a political boundary, a facility campus; a floor comprising a facility; and a room comprising a building.
L'invention concerne des procédés informatisés et un appareil informatique destinés à gérer le risque de sécurité par établissement d'un rapport hiérarchique entre deux éléments ou plus comportant une entité et recevant une indication d'un risque de sécurité lié à un ou plusieurs des éléments. Un choix d'un élément peut également être reçu et une description du risque de sécurité peut être transmis, car il se relie à l'élément choisi et qu'il est basé sur le rapport hiérarchique des éléments et de l'indication du risque de sécurité. Une liste de ressources liées aux éléments choisis peut également être produite. Les éléments peuvent comprendre, par exemple, un secteur géographique tracé selon au moins: un continent, une frontière nationale; une frontière politique, un campus de service, une salle comportant un bâtiment.

Claims

Description

Topics

Download Full PDF Version (Non-Commercial Use)

Patent Citations (1)

    Publication numberPublication dateAssigneeTitle
    US-2001027388-A1October 04, 2001Anthony Beverina, Bryan WareMethod and apparatus for risk management

NO-Patent Citations (6)

    Title
    "ANTI-TERRORISM SOFTWARE MODELS REAL EFFECTS OF BIOLOGICAL WEAPONS" SECURITY, CAHNERS PUB., NEWTON, MA, US, vol. 36, no. 7, July 1999 (1999-07), pages 9-10, XP002938344 ISSN: 0890-8826
    IAKOVOU ET AL: "An information management system for the emergency management of hurricane disasters" INT. J. RISK ASSESSMENT AND MANAGEMENT, [Online] vol. 2, no. 3/4, 2001, pages 243-262, XP002357521 Retrieved from the Internet: URL:http://www.environmental-center.com/ma gazine/inderscience/ijram/art3.pdf> [retrieved on 2005-12-05]
    KOILPILLAI J ET AL: "RECON-a tool for incident detection, tracking and response" DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, 2000. DISCEX '00. PROCEEDINGS HILTON HEAD, SC, USA 25-27 JAN. 2000, LAS ALAMITOS, CA, USA,IEEE COMPUT. SOC, US, vol. 1, 25 January 2000 (2000-01-25), pages 199-206, XP010371167 ISBN: 0-7695-0490-6
    RISKWATCH, INC.: "How To Do A Complete Automated Risk Assessment: A Methodology Review"[Online] November 2002 (2002-11), pages 1-21, XP002357520 Retrieved from the Internet: URL:http://www.riskwatch.com/Whitepapers/H ow_To_Do_A_Complete_Automated_Risk_Assessm ent_10-02RW.pdf> [retrieved on 2005-12-05]
    See also references of WO 2004061596A2
    SMART J C: "A rule-based object-oriented model for security monitoring and control" PROCEEDINGS OF THE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 3 October 1989 (1989-10-03), pages 63-67, XP010324659 Zurich, CH

Cited By (0)

    Publication numberPublication dateAssigneeTitle