CA2396988A1 - System and method for assessing the security posture of a network and having a graphical user interface - Google Patents

System and method for assessing the security posture of a network and having a graphical user interface Download PDF

Info

Publication number
CA2396988A1
CA2396988A1 CA002396988A CA2396988A CA2396988A1 CA 2396988 A1 CA2396988 A1 CA 2396988A1 CA 002396988 A CA002396988 A CA 002396988A CA 2396988 A CA2396988 A CA 2396988A CA 2396988 A1 CA2396988 A1 CA 2396988A1
Authority
CA
Canada
Prior art keywords
network
graphical user
assessing
user interface
vulnerability
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002396988A
Other languages
French (fr)
Other versions
CA2396988C (en
Inventor
Kevin Fox
Ronda Henning
John Farrell
Clifford Miller
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harris Corp
Original Assignee
Harris Corporation
Kevin Fox
Ronda Henning
John Farrell
Clifford Miller
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=23988031&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CA2396988(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Harris Corporation, Kevin Fox, Ronda Henning, John Farrell, Clifford Miller filed Critical Harris Corporation
Publication of CA2396988A1 publication Critical patent/CA2396988A1/en
Application granted granted Critical
Publication of CA2396988C publication Critical patent/CA2396988C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/20Network management software packages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/22Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Abstract

A graphical user inferface is contained on a computer screen and used for determining the vulnerability posture of a network. A system design window displays network items of a network map that are representative of different network elements contained within the network. The respective network icons are linked together in an arrangement corresponding to how network elements are interconnected within the network. Selected portions of the network map turn a different color indicative of a vulnerability that has been established for that portion of the network after a vulnerability posture of the network has been established.
CA002396988A 2000-02-08 2001-02-02 System and method for assessing the security posture of a network and having a graphical user interface Expired - Fee Related CA2396988C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US09/500,101 US6535227B1 (en) 2000-02-08 2000-02-08 System and method for assessing the security posture of a network and having a graphical user interface
US09/500,101 2000-02-08
PCT/US2001/003436 WO2001059989A2 (en) 2000-02-08 2001-02-02 System and method for assessing the security of a network

Publications (2)

Publication Number Publication Date
CA2396988A1 true CA2396988A1 (en) 2001-08-16
CA2396988C CA2396988C (en) 2007-05-01

Family

ID=23988031

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002396988A Expired - Fee Related CA2396988C (en) 2000-02-08 2001-02-02 System and method for assessing the security posture of a network and having a graphical user interface

Country Status (11)

Country Link
US (1) US6535227B1 (en)
EP (1) EP1254536B1 (en)
JP (1) JP2003523030A (en)
KR (1) KR20030004346A (en)
CN (1) CN100442700C (en)
AT (1) ATE335328T1 (en)
AU (1) AU2001234759A1 (en)
CA (1) CA2396988C (en)
DE (1) DE60121917T2 (en)
TW (1) TW522681B (en)
WO (1) WO2001059989A2 (en)

Families Citing this family (198)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6321338B1 (en) * 1998-11-09 2001-11-20 Sri International Network surveillance
EP1149339A1 (en) 1998-12-09 2001-10-31 Network Ice Corporation A method and apparatus for providing network and computer system security
JP4336413B2 (en) * 1999-04-09 2009-09-30 キヤノン株式会社 Display processing method, data processing apparatus, and computer-readable storage medium
GB2349962B (en) * 1999-05-10 2001-07-11 3Com Corp Supervising a network
US7346929B1 (en) * 1999-07-29 2008-03-18 International Business Machines Corporation Method and apparatus for auditing network security
DE19942315A1 (en) * 1999-09-04 2001-05-17 Gfs Systemtechnik Gmbh & Co Kg Process for the configuration and parameterization of a computer program for the operation of a plant for process data processing
US8006243B2 (en) * 1999-12-07 2011-08-23 International Business Machines Corporation Method and apparatus for remote installation of network drivers and software
US7062782B1 (en) * 1999-12-22 2006-06-13 Uunet Technologies, Inc. Overlay network for tracking denial-of-service floods in unreliable datagram delivery networks
US6857014B1 (en) * 1999-12-22 2005-02-15 Nortel Network Limited Method and system for designing a network
IL134047A (en) * 2000-01-14 2004-02-08 Lightscape Networks Ltd Method for selecting the type of communication channels in a multi-layered network and system using same
US7315801B1 (en) 2000-01-14 2008-01-01 Secure Computing Corporation Network security modeling system and method
US6799207B1 (en) * 2000-04-10 2004-09-28 International Business Machines Corporation Method and system for downloading software managed trees in a network processing system
US7921459B2 (en) 2000-04-28 2011-04-05 International Business Machines Corporation System and method for managing security events on a network
IL152502A0 (en) * 2000-04-28 2003-05-29 Internet Security Systems Inc Method and system for managing computer security information
US7162649B1 (en) * 2000-06-30 2007-01-09 Internet Security Systems, Inc. Method and apparatus for network assessment and authentication
US6901346B2 (en) 2000-08-09 2005-05-31 Telos Corporation System, method and medium for certifying and accrediting requirements compliance
US6993448B2 (en) 2000-08-09 2006-01-31 Telos Corporation System, method and medium for certifying and accrediting requirements compliance
US7380270B2 (en) 2000-08-09 2008-05-27 Telos Corporation Enhanced system, method and medium for certifying and accrediting requirements compliance
US7917393B2 (en) * 2000-09-01 2011-03-29 Sri International, Inc. Probabilistic alert correlation
US7512894B1 (en) * 2000-09-11 2009-03-31 International Business Machines Corporation Pictorial-based user interface management of computer hardware components
US9027121B2 (en) 2000-10-10 2015-05-05 International Business Machines Corporation Method and system for creating a record for one or more computer security incidents
US20020138643A1 (en) * 2000-10-19 2002-09-26 Shin Kang G. Method and system for controlling network traffic to a network computer
US7146305B2 (en) * 2000-10-24 2006-12-05 Vcis, Inc. Analytical virtual machine
US20020107954A1 (en) * 2000-10-31 2002-08-08 Glen Ferguson Data model for automated server configuration
US8250570B2 (en) 2000-10-31 2012-08-21 Hewlett-Packard Development Company, L.P. Automated provisioning framework for internet site servers
US7130466B2 (en) * 2000-12-21 2006-10-31 Cobion Ag System and method for compiling images from a database and comparing the compiled images with known images
US20050207444A1 (en) * 2001-01-12 2005-09-22 Eci Telecom Ltd. Hybrid network element for a multi-protocol layered transmissions network and a graphical representation of the network
WO2002062049A2 (en) * 2001-01-31 2002-08-08 Timothy David Dodd Method and system for calculating risk in association with a security audit of a computer network
EP1364286B1 (en) * 2001-02-20 2009-08-19 Siemens Aktiengesellschaft Method and device for determining a full error description for at least one part of a technical system, computer program element and computer-readable storage medium
US7590745B2 (en) * 2001-03-02 2009-09-15 International Business Machines Corporation System and method for analyzing a router in a shared network system
US6900822B2 (en) * 2001-03-14 2005-05-31 Bmc Software, Inc. Performance and flow analysis method for communication networks
US7028228B1 (en) 2001-03-28 2006-04-11 The Shoregroup, Inc. Method and apparatus for identifying problems in computer networks
US7296194B1 (en) 2002-03-28 2007-11-13 Shoregroup Inc. Method and apparatus for maintaining the status of objects in computer networks using virtual state machines
US7197561B1 (en) * 2001-03-28 2007-03-27 Shoregroup, Inc. Method and apparatus for maintaining the status of objects in computer networks using virtual state machines
WO2002079907A2 (en) * 2001-03-29 2002-10-10 Accenture Llp Overall risk in a system
US7743147B2 (en) * 2001-04-20 2010-06-22 Hewlett-Packard Development Company, L.P. Automated provisioning of computing networks using a network database data model
GB2375277B (en) * 2001-05-03 2005-04-06 Ibm A method and apparatus for display of access control in a graphical user interface
US7657419B2 (en) * 2001-06-19 2010-02-02 International Business Machines Corporation Analytical virtual machine
US7096503B1 (en) * 2001-06-29 2006-08-22 Mcafee, Inc. Network-based risk-assessment tool for remotely detecting local computer vulnerabilities
US20030048292A1 (en) * 2001-09-13 2003-03-13 Branson Michael John Method and apparatus for displaying information
US7379993B2 (en) * 2001-09-13 2008-05-27 Sri International Prioritizing Bayes network alerts
US7109998B2 (en) * 2001-10-03 2006-09-19 Sun Microsystems, Inc. Stationary semantic zooming
EP1461927B1 (en) 2001-10-25 2006-04-12 General Dynamics Government Systems Corporation A method and system for modelling, analysis, and display of network security events
US7174029B2 (en) * 2001-11-02 2007-02-06 Agostinelli John A Method and apparatus for automatic selection and presentation of information
JP2003141055A (en) * 2001-11-07 2003-05-16 Hitachi Ltd Connection setting method for computer system
US7281020B2 (en) * 2001-12-12 2007-10-09 Naomi Fine Proprietary information identification, management and protection
WO2003058451A1 (en) * 2002-01-04 2003-07-17 Internet Security Systems, Inc. System and method for the managed security control of processes on a computer system
JP4190765B2 (en) * 2002-01-18 2008-12-03 株式会社コムスクエア Security level information providing method and system
US20030158927A1 (en) * 2002-02-21 2003-08-21 Gateway, Inc. Connected home network console
US7299504B1 (en) 2002-03-08 2007-11-20 Lucent Technologies Inc. System and method for implementing security management using a database-modeled security policy
US7167983B1 (en) 2002-03-08 2007-01-23 Lucent Technologies Inc. System and method for security project management
US7360158B1 (en) * 2002-03-28 2008-04-15 At&T Mobility Ii Llc Interactive education tool
US7613795B2 (en) * 2002-05-09 2009-11-03 Qwest Communications International, Inc. Systems and methods for archiving network planning processes
US7519709B2 (en) 2002-05-09 2009-04-14 Qwest Communications International Inc. Systems and methods for creating network architecture planning tools
US8335839B2 (en) * 2002-05-09 2012-12-18 Qwest Communications International Inc. Systems and methods for using network architecture planning tools
US7370360B2 (en) * 2002-05-13 2008-05-06 International Business Machines Corporation Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine
US7340770B2 (en) * 2002-05-15 2008-03-04 Check Point Software Technologies, Inc. System and methodology for providing community-based security policies
US7509675B2 (en) * 2002-05-29 2009-03-24 At&T Intellectual Property I, L.P. Non-invasive monitoring of the effectiveness of electronic security services
US8549114B2 (en) 2002-06-12 2013-10-01 Bladelogic, Inc. Method and system for model-based heterogeneous server configuration management
WO2003107211A1 (en) * 2002-06-18 2003-12-24 Esecurityonline Methods and systems for managing enterprise assets
US20040001084A1 (en) * 2002-06-28 2004-01-01 Nandini Shrinidhi N x M network graphical user interface and method of use
US7930753B2 (en) * 2002-07-01 2011-04-19 First Data Corporation Methods and systems for performing security risk assessments of internet merchant entities
US20040006704A1 (en) * 2002-07-02 2004-01-08 Dahlstrom Dale A. System and method for determining security vulnerabilities
US7454423B2 (en) 2002-09-06 2008-11-18 Oracle International Corporation Enterprise link for a software database
US7941542B2 (en) * 2002-09-06 2011-05-10 Oracle International Corporation Methods and apparatus for maintaining application execution over an intermittent network connection
US7899879B2 (en) * 2002-09-06 2011-03-01 Oracle International Corporation Method and apparatus for a report cache in a near real-time business intelligence system
US7412481B2 (en) 2002-09-16 2008-08-12 Oracle International Corporation Method and apparatus for distributed rule evaluation in a near real-time business intelligence system
US7912899B2 (en) * 2002-09-06 2011-03-22 Oracle International Corporation Method for selectively sending a notification to an instant messaging device
US8165993B2 (en) * 2002-09-06 2012-04-24 Oracle International Corporation Business intelligence system with interface that provides for immediate user action
US7945846B2 (en) 2002-09-06 2011-05-17 Oracle International Corporation Application-specific personalization for data display
US8255454B2 (en) * 2002-09-06 2012-08-28 Oracle International Corporation Method and apparatus for a multiplexed active data window in a near real-time business intelligence system
US20040049698A1 (en) * 2002-09-06 2004-03-11 Ott Allen Eugene Computer network security system utilizing dynamic mobile sensor agents
US7401158B2 (en) * 2002-09-16 2008-07-15 Oracle International Corporation Apparatus and method for instant messaging collaboration
US7426059B2 (en) 2002-09-16 2008-09-16 Oracle International Corporation Data presentation methods and apparatus to facilitate printing and reviewing
US7668917B2 (en) 2002-09-16 2010-02-23 Oracle International Corporation Method and apparatus for ensuring accountability in the examination of a set of data elements by a user
JP3831696B2 (en) * 2002-09-20 2006-10-11 株式会社日立製作所 Network management apparatus and network management method
US7472421B2 (en) * 2002-09-30 2008-12-30 Electronic Data Systems Corporation Computer model of security risks
US8407798B1 (en) 2002-10-01 2013-03-26 Skybox Secutiry Inc. Method for simulation aided security event management
US8359650B2 (en) * 2002-10-01 2013-01-22 Skybox Secutiry Inc. System, method and computer readable medium for evaluating potential attacks of worms
FR2847360B1 (en) * 2002-11-14 2005-02-04 Eads Defence & Security Ntwk METHOD AND DEVICE FOR ANALYZING THE SECURITY OF AN INFORMATION SYSTEM
US6983221B2 (en) 2002-11-27 2006-01-03 Telos Corporation Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing robust risk assessment model
US6980927B2 (en) 2002-11-27 2005-12-27 Telos Corporation Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment
US20040111643A1 (en) * 2002-12-02 2004-06-10 Farmer Daniel G. System and method for providing an enterprise-based computer security policy
US7941854B2 (en) * 2002-12-05 2011-05-10 International Business Machines Corporation Method and system for responding to a computer intrusion
US8122498B1 (en) * 2002-12-12 2012-02-21 Mcafee, Inc. Combined multiple-application alert system and method
US8312535B1 (en) 2002-12-12 2012-11-13 Mcafee, Inc. System, method, and computer program product for interfacing a plurality of related applications
US8990723B1 (en) 2002-12-13 2015-03-24 Mcafee, Inc. System, method, and computer program product for managing a plurality of applications via a single interface
US8239941B1 (en) 2002-12-13 2012-08-07 Mcafee, Inc. Push alert system, method, and computer program product
US7913303B1 (en) 2003-01-21 2011-03-22 International Business Machines Corporation Method and system for dynamically protecting a computer system from attack
US7330889B2 (en) * 2003-03-06 2008-02-12 Actional Corporation Network interaction analysis arrangement
US20040193918A1 (en) * 2003-03-28 2004-09-30 Kenneth Green Apparatus and method for network vulnerability detection and compliance assessment
US8201256B2 (en) * 2003-03-28 2012-06-12 Trustwave Holdings, Inc. Methods and systems for assessing and advising on electronic compliance
US8984644B2 (en) 2003-07-01 2015-03-17 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9118710B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc System, method, and computer program product for reporting an occurrence in different manners
US9118711B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9350752B2 (en) 2003-07-01 2016-05-24 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9118709B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9118708B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Multi-path remediation
US20070113272A2 (en) 2003-07-01 2007-05-17 Securityprofiling, Inc. Real-time vulnerability monitoring
US9100431B2 (en) 2003-07-01 2015-08-04 Securityprofiling, Llc Computer program product and apparatus for multi-path remediation
US7099797B1 (en) 2003-07-08 2006-08-29 Avanza Technologies, Inc. System and method of testing software and hardware in a reconfigurable instrumented network
US7765319B1 (en) 2003-07-30 2010-07-27 Gorman Sean P System and method for analyzing the structure of logical networks
US8042187B2 (en) * 2003-08-25 2011-10-18 Hewlett-Packard Development Company, L.P. Security indication spanning tree system and method
US7519996B2 (en) * 2003-08-25 2009-04-14 Hewlett-Packard Development Company, L.P. Security intrusion mitigation system and method
US7644365B2 (en) * 2003-09-12 2010-01-05 Cisco Technology, Inc. Method and system for displaying network security incidents
US7657938B2 (en) * 2003-10-28 2010-02-02 International Business Machines Corporation Method and system for protecting computer networks by altering unwanted network data traffic
KR100576720B1 (en) * 2003-12-24 2006-05-03 한국전자통신연구원 Apparatus for managing security of IP based network
EP1716471B1 (en) * 2004-02-11 2018-11-21 Entit Software LLC System and method for testing web applications with recursive discovery and analysis
US7765597B2 (en) * 2004-02-11 2010-07-27 Hewlett-Packard Development Company, L.P. Integrated crawling and auditing of web applications and web content
US20060282494A1 (en) * 2004-02-11 2006-12-14 Caleb Sima Interactive web crawling
US20050198058A1 (en) * 2004-03-04 2005-09-08 International Business Machines Corporation Services offering delivery method
US7571181B2 (en) * 2004-04-05 2009-08-04 Hewlett-Packard Development Company, L.P. Network usage analysis system and method for detecting network congestion
US20050234920A1 (en) * 2004-04-05 2005-10-20 Lee Rhodes System, computer-usable medium and method for monitoring network activity
CN100401678C (en) * 2004-05-21 2008-07-09 华为技术有限公司 Network management method for VPN
JP4341517B2 (en) * 2004-06-21 2009-10-07 日本電気株式会社 Security policy management system, security policy management method and program
US20060021046A1 (en) * 2004-07-22 2006-01-26 Cook Chad L Techniques for determining network security
US7529195B2 (en) 2004-07-30 2009-05-05 Fortiusone, Inc. System and method of mapping and analyzing vulnerabilities in networks
US9436820B1 (en) 2004-08-02 2016-09-06 Cisco Technology, Inc. Controlling access to resources in a network
US7428754B2 (en) * 2004-08-17 2008-09-23 The Mitre Corporation System for secure computing using defense-in-depth architecture
US20060075503A1 (en) * 2004-09-13 2006-04-06 Achilles Guard, Inc. Dba Critical Watch Method and system for applying security vulnerability management process to an organization
US20060085852A1 (en) * 2004-10-20 2006-04-20 Caleb Sima Enterprise assessment management
US9083748B2 (en) * 2004-12-16 2015-07-14 Hewlett-Packard Development Company, L.P. Modelling network to assess security properties
US7607170B2 (en) 2004-12-22 2009-10-20 Radware Ltd. Stateful attack protection
US8850565B2 (en) * 2005-01-10 2014-09-30 Hewlett-Packard Development Company, L.P. System and method for coordinating network incident response activities
US8590011B1 (en) * 2005-02-24 2013-11-19 Versata Development Group, Inc. Variable domain resource data security for data processing systems
DE102005013286B3 (en) * 2005-03-22 2006-09-14 Siemens Ag Method for detecting causes of faults and their transient effects on a technical system
WO2006102515A1 (en) * 2005-03-23 2006-09-28 Belarc, Inc. Security control verification and monitoring subsystem for use in a computer information database system
US7574322B2 (en) * 2005-05-10 2009-08-11 Microsoft Corporation Automated client device management
US7743421B2 (en) 2005-05-18 2010-06-22 Alcatel Lucent Communication network security risk exposure management systems and methods
US20070006315A1 (en) * 2005-07-01 2007-01-04 Firas Bushnaq Network asset security risk surface assessment apparatus and method
US20070016960A1 (en) * 2005-07-18 2007-01-18 Nt Objectives, Inc. NTO input validation technique
JP4890806B2 (en) * 2005-07-27 2012-03-07 富士通株式会社 Prediction program and prediction device
US20070033276A1 (en) * 2005-08-08 2007-02-08 Southern Company Services, Inc. Application portfolio and architecture research tool
CN100429890C (en) * 2005-09-05 2008-10-29 北京启明星辰信息技术有限公司 Visable positioning method and system for network safety event
US8095984B2 (en) * 2005-09-22 2012-01-10 Alcatel Lucent Systems and methods of associating security vulnerabilities and assets
US8438643B2 (en) * 2005-09-22 2013-05-07 Alcatel Lucent Information system service-level security risk analysis
US20070067845A1 (en) * 2005-09-22 2007-03-22 Alcatel Application of cut-sets to network interdependency security risk assessment
US8544098B2 (en) 2005-09-22 2013-09-24 Alcatel Lucent Security vulnerability information aggregation
US8484250B2 (en) * 2005-09-30 2013-07-09 Rockwell Automation Technologies, Inc. Data federation with industrial control systems
US7492716B1 (en) * 2005-10-26 2009-02-17 Sanmina-Sci Method for efficiently retrieving topology-specific data for point-to-point networks
US7606420B1 (en) * 2005-10-31 2009-10-20 Adobe Systems, Incorporated Method and apparatus for improving the speed of belief propagation
US20070143849A1 (en) * 2005-12-19 2007-06-21 Eyal Adar Method and a software system for end-to-end security assessment for security and CIP professionals
US8392999B2 (en) * 2005-12-19 2013-03-05 White Cyber Knight Ltd. Apparatus and methods for assessing and maintaining security of a computerized system under development
US7587675B2 (en) * 2006-02-28 2009-09-08 Microsoft Corporation Network map
US8387138B2 (en) 2006-03-21 2013-02-26 At&T Intellectual Property I, L.P. Security scanning system and method
US8321944B1 (en) * 2006-06-12 2012-11-27 Redseal Networks, Inc. Adaptive risk analysis methods and apparatus
US8561189B2 (en) * 2006-06-23 2013-10-15 Battelle Memorial Institute Method and apparatus for distributed intrusion protection system for ultra high bandwidth networks
CN101001173B (en) * 2006-06-29 2010-08-18 华为技术有限公司 Method for estimating network protection status
US7681132B2 (en) * 2006-07-13 2010-03-16 International Business Machines Corporation System, method and program product for visually presenting data describing network intrusions
WO2008031085A2 (en) 2006-09-08 2008-03-13 Fortiusone, Inc. System and method for web enabled geo-analytics and image processing
EP2074528A4 (en) * 2006-09-12 2012-04-04 Telcordia Tech Inc Ip network vulnerability and policy compliance assessment by ip device analysis
US7849497B1 (en) * 2006-12-14 2010-12-07 Athena Security, Inc. Method and system for analyzing the security of a network
US7937353B2 (en) * 2007-01-15 2011-05-03 International Business Machines Corporation Method and system for determining whether to alter a firewall configuration
US7908660B2 (en) * 2007-02-06 2011-03-15 Microsoft Corporation Dynamic risk management
EP2122490B1 (en) 2007-02-13 2020-11-25 ESRI Technologies, LLC A method and system for integrating a social network and data repository to enable map creation
US8122729B2 (en) * 2007-03-13 2012-02-28 Dri-Eaz Products, Inc. Dehumidification systems and methods for extracting moisture from water damaged structures
WO2009054056A1 (en) 2007-10-25 2009-04-30 Fujitsu Limited Information providing method, relay method, information holding device and relay device
US20090178131A1 (en) * 2008-01-08 2009-07-09 Microsoft Corporation Globally distributed infrastructure for secure content management
US8266518B2 (en) * 2008-01-16 2012-09-11 Raytheon Company Anti-tamper process toolset
US8990947B2 (en) * 2008-02-04 2015-03-24 Microsoft Technology Licensing, Llc Analytics engine
JP5182361B2 (en) * 2008-03-17 2013-04-17 富士通株式会社 Information acquisition support device
US8176560B2 (en) * 2008-05-14 2012-05-08 International Business Machines Corporation Evaluation of tamper resistant software system implementations
US8910255B2 (en) * 2008-05-27 2014-12-09 Microsoft Corporation Authentication for distributed secure content management system
US9069774B1 (en) * 2008-11-04 2015-06-30 Infoblox Inc. Graphical visualization and management of networks
US8925039B2 (en) * 2009-12-14 2014-12-30 At&T Intellectual Property I, L.P. System and method of selectively applying security measures to data services
US20110153391A1 (en) * 2009-12-21 2011-06-23 Michael Tenbrock Peer-to-peer privacy panel for audience measurement
US20130232198A1 (en) * 2009-12-21 2013-09-05 Arbitron Inc. System and Method for Peer-to-Peer Distribution of Media Exposure Data
KR101056268B1 (en) * 2010-01-25 2011-08-11 주식회사 반딧불소프트웨어 Security check system and method for a terminal device capable of computer communication
US9483745B2 (en) * 2010-11-03 2016-11-01 Sap Se Business network GUI
CN102591626B (en) * 2011-01-11 2015-11-25 腾讯科技(深圳)有限公司 A kind of window display method of security classes software and device
US8800045B2 (en) * 2011-02-11 2014-08-05 Achilles Guard, Inc. Security countermeasure management platform
US9553948B2 (en) * 2011-05-05 2017-01-24 Vmware, Inc. User interface for managing monitoring profiles
CN102624696B (en) * 2011-12-27 2014-11-05 中国航天科工集团第二研究院七〇六所 Network security situation evaluation method
WO2013149337A1 (en) 2012-04-02 2013-10-10 Hydrogenics Corporation Fuel cell start up method
WO2014103308A1 (en) * 2012-12-28 2014-07-03 パナソニック株式会社 Control method
US9571372B1 (en) * 2013-01-24 2017-02-14 Symantec Corporation Systems and methods for estimating ages of network devices
US8973134B2 (en) * 2013-05-14 2015-03-03 International Business Machines Corporation Software vulnerability notification via icon decorations
US9367694B2 (en) * 2014-05-16 2016-06-14 Raytheon Bbn Technologies Corp. Probabilistic cyber threat recognition and prediction
KR101646329B1 (en) * 2014-05-30 2016-08-09 한국통신인터넷기술 주식회사 Cyber attack response and analysis system and method thereof
US9819685B1 (en) 2014-12-10 2017-11-14 State Farm Mutual Automobile Insurance Company Method and system for identifying security risks using graph analysis
US9467455B2 (en) 2014-12-29 2016-10-11 Palantir Technologies Inc. Systems for network risk assessment including processing of user access rights associated with a network of devices
US9648036B2 (en) * 2014-12-29 2017-05-09 Palantir Technologies Inc. Systems for network risk assessment including processing of user access rights associated with a network of devices
US9100430B1 (en) 2014-12-29 2015-08-04 Palantir Technologies Inc. Systems for network risk assessment including processing of user access rights associated with a network of devices
US10184974B2 (en) 2015-09-22 2019-01-22 Raytheon Company Systems and methods for determining whether a circuit is operating properly
EP3360043A4 (en) 2015-10-08 2019-04-24 Siege Technologies LLC Assessing effectiveness of cybersecurity technologies
ES2832999T3 (en) * 2015-12-14 2021-06-14 Siemens Ag System and procedure for passive evaluation of industrial perimeter security
US10102376B2 (en) 2016-08-22 2018-10-16 International Business Machines Corporation Implementing locale management on PaaS: locale replacement risk analysis
CA3044909C (en) 2016-11-25 2023-06-27 Cybernetiq, Inc. Computer network security configuration visualization and control system
US10686669B2 (en) * 2017-06-16 2020-06-16 Cisco Technology, Inc. Collecting network models and node information from a network
US10706156B2 (en) * 2017-10-13 2020-07-07 1230604 BC Ltd. Security risk identification in a secure software lifecycle
US10846410B2 (en) * 2017-12-21 2020-11-24 Microsoft Technology Licensing, Llc Automated fuzzing based on analysis of application execution flow
CN109981346B (en) * 2019-02-21 2020-07-10 清华大学 Network space coordinate system creating method and device based on autonomous system
US11734636B2 (en) 2019-02-27 2023-08-22 University Of Maryland, College Park System and method for assessing, measuring, managing, and/or optimizing cyber risk
US10644943B1 (en) * 2019-03-27 2020-05-05 Juniper Networks, Inc. Multilayer and interactive user interfaces for displaying features of an optimized network plan
US11720686B1 (en) * 2020-04-08 2023-08-08 Wells Fargo Bank, N.A. Security model utilizing multi-channel data with risk-entity facing cybersecurity alert engine and portal
US11777992B1 (en) 2020-04-08 2023-10-03 Wells Fargo Bank, N.A. Security model utilizing multi-channel data
US11706241B1 (en) 2020-04-08 2023-07-18 Wells Fargo Bank, N.A. Security model utilizing multi-channel data
CN114500015B (en) * 2022-01-14 2024-02-27 北京网藤科技有限公司 Situation awareness system based on industrial network and control method thereof

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA1314101C (en) 1988-02-17 1993-03-02 Henry Shao-Lin Teng Expert system for security inspection of a digital computer system in a network environment
US5768552A (en) * 1990-09-28 1998-06-16 Silicon Graphics, Inc. Graphical representation of computer network topology and activity
US5138321A (en) 1991-10-15 1992-08-11 International Business Machines Corporation Method for distributed data association and multi-target tracking
US5485409A (en) 1992-04-30 1996-01-16 International Business Machines Corporation Automated penetration analysis system and method
JPH06282527A (en) * 1993-03-29 1994-10-07 Hitachi Software Eng Co Ltd Network control system
CA2216862A1 (en) 1995-03-31 1996-10-03 Abb Power T & D Company Inc. System for optimizing power network design reliability
US5699403A (en) * 1995-04-12 1997-12-16 Lucent Technologies Inc. Network vulnerability management apparatus and method
US5787235A (en) 1995-05-09 1998-07-28 Gte Government Systems Corporation Fuzzy logic-based evidence fusion tool for network analysis
US5745382A (en) 1995-08-31 1998-04-28 Arch Development Corporation Neural network based system for equipment surveillance
JPH09284282A (en) * 1996-02-13 1997-10-31 Hitachi Ltd Virtual network operation management system
US6330005B1 (en) * 1996-02-23 2001-12-11 Visionael Corporation Communication protocol binding in a computer system for designing networks
US5751965A (en) * 1996-03-21 1998-05-12 Cabletron System, Inc. Network connection status monitor and display
US5764913A (en) * 1996-04-05 1998-06-09 Microsoft Corporation Computer network status monitoring system
US5892903A (en) 1996-09-12 1999-04-06 Internet Security Systems, Inc. Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system
US5963653A (en) 1997-06-19 1999-10-05 Raytheon Company Hierarchical information fusion object recognition system and method
US6020889A (en) * 1997-11-17 2000-02-01 International Business Machines Corporation System for displaying a computer managed network layout with varying transience display of user selected attributes of a plurality of displayed network objects
US6298445B1 (en) 1998-04-30 2001-10-02 Netect, Ltd. Computer security
US6054987A (en) * 1998-05-29 2000-04-25 Hewlett-Packard Company Method of dynamically creating nodal views of a managed network
DE69929206T2 (en) * 1998-07-21 2006-08-24 Computer Associates Think, Inc. SYSTEM FOR ANALYSIS OF INFORMATION SECURITY
US6356282B2 (en) * 1998-12-04 2002-03-12 Sun Microsystems, Inc. Alarm manager system for distributed network management system

Also Published As

Publication number Publication date
EP1254536A2 (en) 2002-11-06
JP2003523030A (en) 2003-07-29
DE60121917T2 (en) 2007-03-29
CN100442700C (en) 2008-12-10
WO2001059989A2 (en) 2001-08-16
AU2001234759A1 (en) 2001-08-20
CA2396988C (en) 2007-05-01
EP1254536B1 (en) 2006-08-02
US6535227B1 (en) 2003-03-18
CN1398470A (en) 2003-02-19
ATE335328T1 (en) 2006-08-15
DE60121917D1 (en) 2006-09-14
WO2001059989A3 (en) 2002-02-07
TW522681B (en) 2003-03-01
KR20030004346A (en) 2003-01-14

Similar Documents

Publication Publication Date Title
CA2396988A1 (en) System and method for assessing the security posture of a network and having a graphical user interface
USD454138S1 (en) Computer generated image for display panel or screen
EP1174787A3 (en) Scaling icons in a data processing system
EP1162552A3 (en) Information display system having graphical user interface
USD396457S (en) Display screen with an icon
CA2285588A1 (en) Design of computer networks
NZ333362A (en) Computer vision system, graphical user interface superimposed on picture from camera
WO2001064014A3 (en) System and method for hazardous incident decision support and training
CA2402316A1 (en) Method of using buttons associated with a display to access and execute associated functions
WO1999066395A3 (en) Method for dynamically displaying controls in a toolbar display based on control usage
CA2307229A1 (en) Method of generating a display for a dynamic simulation model utilizing node and link representations
WO2001098949A3 (en) Methods and systems of providing information to computer users
WO2002025488A3 (en) System and method to correlate and access related text with locations on an electronically displayed map
CA2311560A1 (en) A method of providing access to object parameters within a simulation model
US20050156943A1 (en) Super imposed image display color selection system and method
AU2003280535A1 (en) The method of processing alarm in the communicate network and a relativity analysis manager
AU2945400A (en) Advertising method through display screen or sound on user computer over network and computer readable medium therefor
ID23090A (en) EQUIPMENT DISPLAY AND METHODS OF TARAF MANAGER DISPLAYS FOR MENU DISPLAYS ON THE SCREEN IN THE PICTURE APPEARANCE
USD396224S (en) Computer screen with a set of icons
EP1770461A3 (en) System and method for identifying particularized equipment information of interest to varied users in an industrial automation environment
WO2002006922A3 (en) Method and apparatus for identifying a subject
CA2356604A1 (en) Method to document relations between objects using a graphical interface tree component
CA2422602A1 (en) Color displays of multiple slices of 3-d seismic data
CN106445501A (en) Display method of notification bar, and terminal
USD418121S (en) Icon image for a portion of a computer display screen

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed

Effective date: 20170202