Virtual penetration testing using threat analysis is disclosed. Threat analysis may be achieved by evaluating attack paths and chain reactions of compromised assets created by threats, threat agents, or threat mechanisms. A threat agent having an existing access level is identified. The existing access level is used to analyze an attack path between the threat agent and an asset. The existing access level is updated if the analysis of the attack path between the threat agent and the asset indicates that an attack along the path would be successful.

 
Web www.patentalert.com

< System and method for managing storage networks and providing virtualization of resources in such a network using one or more ASICs

> System and method for security rating of computer processes

> Network based system which provides a database of measurement solutions

~ 00516