Skip to Content
Find More Like This
Return to Search


United States Patent Application

View the Complete Application at the US Patent & Trademark Office
Oak Ridge National Laboratory - Visit the Partnerships Directorate Website
A computer implemented method monetizes the security of a cyber-system in terms of losses each stakeholder may expect to lose if a security break down occurs. A non-transitory media stores instructions for generating a stake structure that includes costs that each stakeholder of a system would lose if the system failed to meet security requirements and generating a requirement structure that includes probabilities of failing requirements when computer components fails. The system generates a vulnerability model that includes probabilities of a component failing given threats materializing and generates a perpetrator model that includes probabilities of threats materializing. The system generates a dot product of the stakes structure, the requirement structure, the vulnerability model and the perpetrator model. The system can further be used to compare, contrast and evaluate alternative courses of actions best suited for the stakeholders and their requirements.
Abercrombie, Robert K. (Oak Ridge, TN), Sheldon, Frederick T. (Oak Ridge, TN), Mili, Ali (Oak Ridge, TN)
UT-Battelle, LLC (Oak Ridge TN)
14/ 134,949
December 19, 2013
STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH AND DEVELOPMENT [0002] The invention was made with United States government support under Contract No. DE-AC05-00OR22725 awarded by the United States Department of Energy. The United States government has certain rights in the invention.