US 12,003,544 B2
System and methods for automatically assessing and improving a cybersecurity risk score
Jason Crabtree, Vienna, VA (US); and Andrew Sellers, Monument, CO (US)
Assigned to QOMPLX LLC, Reston, VA (US)
Filed by QOMPLX LLC, Reston, VA (US)
Filed on Aug. 2, 2021, as Appl. No. 17/392,250.
Application 17/392,250 is a continuation in part of application No. 16/837,551, filed on Apr. 1, 2020, granted, now 11,070,592.
Application 16/837,551 is a continuation in part of application No. 16/777,270, filed on Jan. 30, 2020, granted, now 11,025,674, issued on Jun. 1, 2021.
Application 16/777,270 is a continuation in part of application No. 16/720,383, filed on Dec. 19, 2019, granted, now 10,944,795, issued on Mar. 9, 2021.
Application 16/720,383 is a continuation of application No. 15/823,363, filed on Nov. 27, 2017, granted, now 10,560,483, issued on Feb. 11, 2020.
Application 15/823,363 is a continuation in part of application No. 15/818,733, filed on Nov. 20, 2017, granted, now 10,673,887, issued on Jun. 2, 2020.
Application 15/818,733 is a continuation in part of application No. 15/725,274, filed on Oct. 4, 2017, granted, now 10,609,079, issued on Mar. 31, 2020.
Application 15/725,274 is a continuation in part of application No. 15/655,113, filed on Jul. 20, 2017, granted, now 10,735,456, issued on Aug. 4, 2020.
Application 15/655,113 is a continuation in part of application No. 15/616,427, filed on Jun. 7, 2017, abandoned.
Application 15/616,427 is a continuation in part of application No. 15/237,625, filed on Aug. 15, 2016, granted, now 10,248,910, issued on Apr. 2, 2019.
Application 15/237,625 is a continuation in part of application No. 15/206,195, filed on Jul. 8, 2016, abandoned.
Application 15/206,195 is a continuation in part of application No. 15/186,453, filed on Jun. 18, 2016, abandoned.
Application 15/186,453 is a continuation in part of application No. 15/166,158, filed on May 26, 2016, abandoned.
Application 15/166,158 is a continuation in part of application No. 15/141,752, filed on Apr. 28, 2016, granted, now 10,860,962, issued on Dec. 8, 2020.
Application 15/141,752 is a continuation in part of application No. 15/091,563, filed on Apr. 5, 2016, granted, now 10,204,147, issued on Feb. 12, 2019.
Application 15/091,563 is a continuation in part of application No. 14/986,536, filed on Dec. 31, 2015, granted, now 10,210,255, issued on Feb. 19, 2019.
Application 14/986,536 is a continuation in part of application No. 14/925,974, filed on Oct. 28, 2015, abandoned.
Prior Publication US 2022/0060512 A1, Feb. 24, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); G06F 16/2458 (2019.01); G06F 16/951 (2019.01)
CPC H04L 63/20 (2013.01) [G06F 16/2477 (2019.01); G06F 16/951 (2019.01); H04L 63/1425 (2013.01); H04L 63/1441 (2013.01); H04L 63/1433 (2013.01)] 2 Claims
OG exemplary drawing
 
1. A system for automatically assessing and improving a cybersecurity risk score, comprising:
a computing system comprising a memory, a processor, and a network interface;
a cybersecurity scoring subsystem comprising a first plurality of programming instructions that, when operating on the processor, cause the computing system to:
retrieve a cyber-physical graph for a network;
retrieve a cybersecurity profile for the network based on external reconnaissance of the network by a reconnaissance subsystem;
determine a cybersecurity risk score for the network based on the cybersecurity profile and the cyber-physical graph of the network;
provide the cybersecurity risk score and the cyber-physical graph to a directed computational graph subsystem;
upon changes occurring at one or more of a plurality of target devices, determine a new cybersecurity risk score and provide it to the directed computation graph subsystem;
the directed computational graph subsystem comprising a second plurality of programming instructions that, cause the computing device system to:
analyze the cyber-physical graph and the cybersecurity risk score; and
when the cybersecurity risk score falls below a threshold:
identify a plurality of changes that can be applied to each of the plurality of target devices within the network, the identified plurality of changes being based on results of the analysis;
transmit instructions to the plurality of target devices, wherein upon receipt of the instructions each of the plurality of target devices automatically applies at least one of the identified plurality of changes; and
update the cyber-physical graph based on the applied changes.