US 12,289,334 B2
Analyzing and addressing security threats in network resources
Asaf Hecht, Tel Aviv (IL)
Assigned to CyberArk Software, Ltd., Petach-Tikva (IL)
Filed by CyberArk Software Ltd., Petach-Tikva (IL)
Filed on Apr. 20, 2022, as Appl. No. 17/724,563.
Application 17/724,563 is a continuation in part of application No. 16/719,464, filed on Dec. 18, 2019, granted, now 11,323,470.
Prior Publication US 2022/0247776 A1, Aug. 4, 2022
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/1433 (2013.01) [H04L 63/205 (2013.01)] 24 Claims
OG exemplary drawing
 
1. A non-transitory computer readable medium including instructions that, when executed by at least one processor, cause the at least one processor to perform operations for developing composite risk scores for network resources, the operations comprising:
retrieving data associated with multiple network resources;
using the retrieved data to perform a first assessment for each of the multiple network resources to estimate a vulnerability level for each of the multiple network resources;
developing a result of the first assessment of each of the multiple network resources by accounting for one or more weights associated with factors of the first assessment;
using the retrieved data to perform a second assessment for each of the multiple network resources to estimate an importance level for each of the multiple network resources;
developing a result of the second assessment of each of the multiple network resources by accounting for one or more weights associated with factors of the second assessment;
based on the result of the first assessment and the result of the second assessment, determining a composite risk score for each of the multiple network resources; and
performing a security response based on the determined composite risk score of a specific network resource among the multiple network resources.