- Santa Clara CA, US Lisa Henderson - Temecula CA, US Jose Bernal - San Diego CA, US Bryan Boyle - San Diego CA, US
International Classification:
H04L 29/06 G06F 21/57
Abstract:
An apparatus and associated method are provided for reducing a security risk in a networked computer system architecture. The method comprises receiving at a security computer external vulnerability data from an external source regarding vulnerabilities associated with an attack vector for configuration item (CI) data related to a (CI) device, of the networked computer system. The security computer accesses a configuration management database (CMDB) and the CI data related to the physical device is read. Trust zone data associated with the CI device is determined utilizing the CMDB, and the security computer performs a vulnerability calculation for the CI device utilizing the external vulnerability data and associated trust zone data. This is also done for a second CI device. The vulnerability calculations for both are compared and this comparison serves as a basis for prioritizing an action to be taken on the CI device or associated other network components.
Method And Apparatus For Reducing Security Risk In A Networked Computer System Architecture
- Santa Clara CA, US Lisa Henderson - Temecula CA, US Jose Bernal - San Diego CA, US Bryan Boyle - San Diego CA, US
International Classification:
H04L 29/06
Abstract:
An apparatus and associated method are provided for reducing a security risk in a networked computer system architecture. The method comprises receiving at a security computer external vulnerability data from an external source regarding vulnerabilities associated with an attack vector for configuration item (CI) data related to a (CI) device, of the networked computer system. The security computer accesses a configuration management database (CMDB) and the CI data related to the physical device is read. Trust zone data associated with the CI device is determined utilizing the CMDB, and the security computer performs a vulnerability calculation for the CI device utilizing the external vulnerability data and associated trust zone data. This is also done for a second CI device. The vulnerability calculations for both are compared and this comparison serves as a basis for prioritizing an action to be taken on the CI device or associated other network components.
Vandergriff Honda Arlington, TX 2013 to 2014 Sales RepresentativeGrapevine dodge Grapevine, TX 2012 to 2013 Sales RepresentativeUSMC San Diego, CA 2010 to 2012 USMCHenry's fashion Maturn, Monagas 2009 to 2010 Store ManagerSolo para caballeros Maturn, Monagas 2008 to 2010 Manager
Education:
Iutirla university Maturn, Monagas 2009 to 2011 N.a in Graphic design
Antologia Comentada De La Generacion Del 27: Pedro Salinas .. [et Al] ; Introduccion Victor Garcia De La Concha ; Seleccion Y Comentarios J.L. Bernal .. [et Al].
Brenda Ochoa, Ruben Garcia, Juan Sanchez, Heydy Gonzalez
Googleplus
Jose Bernal
Lived:
La Jolla, CA Antioch, CA
Work:
ServiceNow - Software Development Intern (2012) T-Mobile USA - Sales Associate (2011-2012)
Education:
University of California, San Diego - Computer Science
Bragging Rights:
I'm josebernal, what else could be better?
Jose Bernal
Work:
Once
Education:
Graduado escolar
About:
Tranquilo
Tagline:
Salud trabajo y amor
Bragging Rights:
Cumplidor
Jose Bernal
Work:
Cablevision - Supervisor (2007)
Education:
Universidad ICEL - Programador Analista
Jose Bernal
Work:
ITT Corporation - Finance
Education:
California State University, Northridge
Jose Bernal
Work:
Palacio de las especias - Gerente
About:
Palacio de las Especias es fruto de la cuidada restauración de un antiguo palacete marroquí en el corazón de la medina, es un lujoso hotel boutique de estilo colonial. El riad cuenta con siete habitac...
Tagline:
Palacio de las Especias, disfruta del lujo de un hotel boutique en la Medina de Marrakech
Jose Bernal
Work:
Nazareth - Estudiante
Education:
Basicos
Jose “Joseb93” Bernal
Education:
Universidad tecnologica del ponientes - Gastronomia