Patent attributes
A cyber security risk assessment system is described. In an example implementation, the system may generate an input feature space including data associated with a computing system by collecting the data from a plurality of computer sources. The system may compute a likelihood of data-security breach incidents based on the input feature space using a first computer model, recognize events based on the input feature space using a second computer model, and determine a severity of the data-security breach incident or the event using a third computer model. In some instances, the system may generate risk factor scores based on the determined severity, data-security breach incident, and the event, where the risk factor scores indicate a computer security risk of a certain computer security aspect of the computing system. The system may then perform an action based on the risk factor scores.