Skip to Content
Find More Like This
Return to Search

Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture

United States Patent

9,092,631
July 28, 2015
View the Complete Patent at the US Patent & Trademark Office
Pacific Northwest National Laboratory - Visit the Technology Commercialization Program Website
Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.
Muller; George (Richland, WA), Perkins; Casey J. (West Richland, WA), Lancaster; Mary J. (Richland, WA), MacDonald; Douglas G. (West Richland, WA), Clements; Samuel L. (Richland, WA), Hutton; William J. (Kennewick, WA), Patrick; Scott W. (Kennewick, WA), Key; Bradley Robert (Albuquerque, NM)
Battelle Memorial Institute (Richland, WA)
14/ 055,776
20150106941
October 16, 2013
STATEMENT AS TO RIGHTS TO INVENTIONS MADE UNDER FEDERALLY-SPONSORED RESEARCH AND DEVELOPMENT This invention was made with Government support under Contract DE-AC0576RLO1830 awarded by the U.S. Department of Energy. The Government has certain rights in the invention.