Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_30af8d7b9287ba7934038cd92ae70476 |
classificationCPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-034 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-451 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-542 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06K9-6277 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-577 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F18-2415 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L67-30 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L67-303 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-451 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L67-30 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-54 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06K9-62 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-57 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L67-303 |
filingDate |
2018-12-19-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
grantDate |
2022-08-30-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_b5cc9599f8167ddee0b3c72a41a57d8f http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_37efa7806c5a843194bfb063e56d3120 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_a499868c8e5270c143d027c67c23f7f9 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_c6bf427405b248f3de20b8777e4eb7d6 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_b9cae86d81e2e93f11237e49a6f8f464 |
publicationDate |
2022-08-30-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
US-11429726-B2 |
titleOfInvention |
Cybersecurity maturity assessment |
abstract |
Systems and methods directed to computing a maturity measurement for a computer system. Examples can include generating and outputting to an I/O device, a user interface including a plurality of user input fields for receiving the likelihood and/or impact of a plurality of pre-defined potential events related to a plurality of pre-defined potential vulnerabilities related to a computer system. Examples can also include receiving, via the user interface, a risk profile including the likelihood and/or impact for each event of a selected group of events of the plurality of pre-defined potential events. Examples can also include computing a maturity measurement for the computer system using the risk profile and a database. The database can include information for a set of practices and relationships between practices the set of practices and events of the plurality of pre-defined potential events. |
isCitedBy |
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11659048-B2 |
priorityDate |
2018-01-23-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |