| CPC H04L 63/20 (2013.01) [G06F 16/2477 (2019.01); G06F 16/951 (2019.01); H04L 63/1425 (2013.01); H04L 63/1433 (2013.01); H04L 63/1441 (2013.01)] | 12 Claims |

|
1. A computing system for self-adjusting cybersecurity analysis and rating based on heterogeneous data and reconnaissance, comprising:
one or more hardware processors configured for:
defining a target network and assigning it an Internet reconnaissance score;
collecting domain name system leak information by identifying improper network configurations in the internet protocol addresses and subdomains of the target network, and assigning a domain name system leak information score;
analyzing web applications within the target network to identify vulnerabilities in the web applications that could elicit unwanted behavior or allow unauthorized access to the target network, and assigning a web application security score;
searching social media networks for information of concern related to users present within the target network, and assigning a social network score;
conducting a scan of the target network for open TCP/UDP ports, and assigning an open port score;
identifying leaked credentials associated with the target network that are found to be disclosed in previous breach incidents, and assigning a credential score;
checking version and update information for hardware and software systems within the target network, and assigning a patching frequency score;
performing an Internet search to identify references to content of interest, and assigning an open-source intelligence score;
computing a composite cybersecurity score by combining, via a model, each of the Internet reconnaissance score, the domain name system leak information score, the web application security score, the social network score, the open port score, the credential score, the patching frequency score, and the open-source intelligence score into a single score;
when the composite cybersecurity score falls below a threshold score, executing a specific change impacting the target network to raise the composite cybersecurity score; and
repeating the previous steps in a continuous feedback loop to maintain the system's composite cybersecurity score above the threshold value.
|