US20020147803A1 - Method and system for calculating risk in association with a security audit of a computer network - Google Patents

Method and system for calculating risk in association with a security audit of a computer network Download PDF

Info

Publication number
US20020147803A1
US20020147803A1 US10/066,461 US6646102A US2002147803A1 US 20020147803 A1 US20020147803 A1 US 20020147803A1 US 6646102 A US6646102 A US 6646102A US 2002147803 A1 US2002147803 A1 US 2002147803A1
Authority
US
United States
Prior art keywords
value
vulnerability
risk
security
host
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/066,461
Inventor
Timothy Dodd
Nicolas Heinrich
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Accenture SAS
International Business Machines Corp
Original Assignee
Internet Security Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Internet Security Systems Inc filed Critical Internet Security Systems Inc
Priority to US10/066,461 priority Critical patent/US20020147803A1/en
Assigned to INTERNET SECURITY SYSTEMS, INC. reassignment INTERNET SECURITY SYSTEMS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DODD, TIMOTHY DAVID
Publication of US20020147803A1 publication Critical patent/US20020147803A1/en
Assigned to ACCENTURE SAS reassignment ACCENTURE SAS ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HEINRICH, NICOLAS
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: INTERNET SECURITY SYSTEMS, INC.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Definitions

  • the present invention is generally directed to managing the security of a network. More specifically, the present invention facilitates computing a security score for elements in a distributed computing network.
  • WANs wide area networks
  • LANs local area networks
  • LANs typically are used by a bounded group of people in an organization to communicate and store electronic documents and information.
  • LANs generally are coupled to or provide access to other local or wide area networks. Greater use and availability of computing networks produces a corresponding increase in the size and complexity of computing networks.
  • Security assessment devices can be used to evaluate elements in the network, such as desktop computers, servers, and routers, and to determine their respective vulnerability to security problems, such as an attack from hackers. Security assessment devices can also be used more frequently to monitor the activity or status of the elements in a computing network. These network elements are commonly referred to as hosts. Throughout this specification the terms “host” and “element” will be used interchangeably to refer to the various components that can be found in a distributed computing network.
  • a need in the art for a system that will support the auditing of a distributed computing network.
  • a need exists to accurately quantify the risk posed by vulnerabilities so that they can be compared in association with a particular host and so that hosts can be compared over the entire network.
  • a security audit system can collect data concerning elements in a network. This data can include the operating system and services running on the element and any vulnerabilities associated therewith. This information can be used to calculate a risk for each vulnerability associated with an element. Certain elements may have few vulnerabilities and other elements may have many vulnerabilities. In order to give each element a meaningful security score, a banded calculation method is used. The banded calculation method prevents many low-risk vulnerabilities associated with one element from overshadowing an element with a single high-risk vulnerability. This approach provides a simple means for a user to identify and address high-risk issues in a network.
  • the present invention comprises a method for computing a security score associated with a host in a distributed computing network.
  • a security audit system can select a vulnerability identified in a host and obtain an asset value for the host. The asset value is typically assigned to the host based on its characteristics and functions.
  • the security audit system can also retrieve an exploit probability and a severity value for the vulnerability. Security personnel generally consider the various types of vulnerabilities and select predetermined exploit probabilities and severity values.
  • a risk value for a vulnerability can be computed from the host asset value, the exploit probability of the vulnerability, and the vulnerability's severity value. The risk value computation can be repeated for other vulnerabilities identified in the network. Because an element typically has multiple vulnerabilities, it is also useful to be able to compute a total security score for the element.
  • the security audit system can use a banded calculation model to compute the total security score by placing the risk values in selected bands on a risk scale.
  • the banded calculation model prevents several low risk values from being summed and producing a disproportionately and inaccurately large security score.
  • the present invention provides a method for computing a risk value for quantifying a vulnerability identified in a network.
  • a network security system can receive an asset value for an element on which the vulnerability is detected. The asset value can be based on information collected during a security audit of the element.
  • the network security system can also receive a predetermined exploit probability and severity value for the vulnerability. Taking the asset value, the exploit probability, and the severity value, the network security system can compute a risk value that is useful in comparing other vulnerabilities in the network. The risk value can also be adjusted by a factor that reflects the difficulty of remedying the vulnerability.
  • FIG. 1 is a block diagram illustrating an exemplary architecture for operating an embodiment of the present invention.
  • FIG. 2 is a logic flow diagram illustrating an overview of the operating steps performed by a security audit system in accordance with an exemplary embodiment of the present invention.
  • FIG. 3 is a logic flow diagram illustrating an exemplary process for analyzing the results of a security audit scan.
  • FIG. 4 is a logic flow diagram illustrating an exemplary process for calculating an asset value for a host.
  • FIG. 5 is a logic flow diagram illustrating an exemplary process for calculating a risk value for a vulnerability, and for accumulating these risk values for a single host.
  • FIG. 6 is a logic flow diagram illustrating an exemplary process for adjusting a vulnerability's calculated risk value as a function of the difficulty of fixing the vulnerability.
  • FIG. 7 is logic flow diagram illustrating an exemplary process for assigning a vulnerability's risk value to a risk band, and for incrementing the count of vulnerabilities assigned to the band.
  • FIG. 8A is a diagram illustrating a representative example of a banded scale useful for calculating a security score from one or more risk values.
  • FIG. 8B is a logic flow diagram illustrating an exemplary process for calculating a security score from the banded scale.
  • FIG. 9 is a logic flow diagram illustrating an exemplary process for determining the highest-risk band with at least one vulnerability risk value assigned to it.
  • FIG. 10 is a logic flow diagram illustrating an exemplary process for summing the risk values in each band on the banded scale.
  • the present invention supports the assessment of the security risks of a computing network by providing a precise means to calculate and compare the risks posed by security vulnerabilities.
  • the present invention allows a security auditing system to identify security vulnerabilities in various elements throughout a network.
  • the security auditing system also can collect information about the function and importance of elements in a computing network. Using this information, the invention calculates a risk value for each security vulnerability that is identified.
  • the risk value can be prioritized based on the ease with which the vulnerability can be repaired. Prioritizing risk values for a particular network element assists a user or network administrator in deciding which vulnerabilities to address first.
  • the invention also supports the calculation of a security score for a network element that accumulates the risk values of each vulnerability associated with the element.
  • employing a band calculation method ensures that a large number of low-risk vulnerabilities does not produce a higher security score than a smaller number of high-risk vulnerabilities. Calculating a security score for each element with the band calculation method allows for a more meaningful comparison of elements across a network.
  • program modules may be physically located in different local and remote memory storage devices. Execution of the program modules may occur locally in a stand-alone manner or remotely in a client/server manner. Examples of such distributed computing environments include local area networks of an office, enterprise-wide computer networks, and the global Internet.
  • the processes and operations performed by the computer include the manipulation of signals by a client or server and the maintenance of these signals within data structures resident in one or more of the local or remote memory storage devices.
  • Such data structures impose a physical organization upon the collection of data stored within a memory storage device and represent specific electrical or magnetic elements.
  • the present invention also includes a computer program that embodies the functions described herein and illustrated in the appended flow charts.
  • a computer program that embodies the functions described herein and illustrated in the appended flow charts.
  • the invention should not be construed as limited to any one set of computer program instructions.
  • a skilled programmer would be able to write such a computer program to implement the disclosed invention based on the flow charts and associated description in the application text, for example. Therefore, disclosure of a particular set of program code instructions is not considered necessary for an adequate understanding of how to make and use the invention.
  • the inventive functionality of the claimed computer program will be explained in more detail in the following description in conjunction with the remaining figures illustrating the program flow.
  • FIG. 1 illustrates various aspects of an exemplary computing environment in which an embodiment of the present invention is designed to operate.
  • the architecture comprises a console 105 and a security audit system 115 which are used to configure and schedule security audits of a network 110 .
  • the console 105 communicates information about the current security state of the network 110 to a user.
  • the console 105 typically comprises a graphical user interface for presenting and managing data in a convenient format for the user.
  • the console 105 is also operable for receiving information from the security audit system 115 and allowing control of the security audit system 115 .
  • the security audit system 115 comprises an active scan engine 120 and one or more other scan engines.
  • the active scan engine 120 is coupled to an Internet scanning engine 130 , a system scanning engine 150 , and a database scanning engine 140 .
  • Each of these scan engines illustrated in FIG. 1 is coupled to a corresponding database.
  • the active scan engine's 120 primary task is acquiring and maintaining current data about the configuration and security posture of the network 110 .
  • the active scan engine 120 utilizes the subsidiary scan engines 130 , 140 and 150 as a means for gathering information about the network 110 .
  • the network 110 typically comprises elements such as desktop computers, routers, and various servers.
  • the active scan engine 120 is responsible for coordinating the configuration, scheduling, and running of scans of these elements found in the network 110 .
  • the active scan engine 120 is continuously running so that the scheduled scans can be run at their designated times, and the resultant data processed in a timely manner.
  • an active scan engine 120 configures scans that are to be run on a network 110 .
  • the active scan engine schedules the times at which the various configured scans will be run on the network 110 .
  • An exemplary method for configuring and scheduling scans is described in greater detail in the U.S. non-provisional patent application filed concurrently herewith and referenced herein.
  • a scan may be run against particular hosts in the network or over the entire network 110 .
  • a scan collects information about the function of the hosts on the network and their respective vulnerabilities. This information is gathered, analyzed, and used to compute a security score for each host or element in the network in step 220 .
  • the security scores assist a user or network administrator in determining which vulnerabilities should be addressed first.
  • FIG. 3 illustrates an exemplary process for analyzing the results of a security scan, as referenced in step 220 , for hosts located on the network 110 .
  • the active scan engine 120 selects the ID of the first scan for which data are available.
  • the active scan engine 120 selects the ID of the first host for which data are available in the current scan job results.
  • the active scan engine 120 calculates an asset value for the current host. Asset values are calculated based on the operating system and services associated with the host. An asset value is a characteristic representing the importance of a particular host or element in the operation of the network.
  • the active scan engine computes a risk value for each vulnerability detected on the current host.
  • the risk value quantifies the risk a particular vulnerability presents for a network.
  • each risk value calculated for a vulnerability is assigned to a band on the risk scale.
  • the active scan engine 120 uses the number of risk values assigned to each band, the active scan engine 120 computes a security score for the current host, in step 325 .
  • step 330 the active scan engine 120 determines if there are more hosts in the current job to be processed. If there are more hosts, the ID of the next host is retrieved in step 335 , and the process 220 returns to step 315 . In step 330 , if there are no more hosts to process in the current job, the active scan engine 120 determines if there are more scan jobs to process in step 340 . If there are more scan jobs, the ID of the next scan job is retrieved in step 340 , and the process returns to step 310 . In step 340 , if the active scan engine 120 finds that there are no more hosts to process, the analysis is complete.
  • FIG. 4 illustrates an exemplary method for calculating an asset value as referred to in step 315 of FIG. 3.
  • Predetermined asset values are generally assigned for the various operating systems, host services, and the vulnerabilities that are likely to be encountered in a scan of a network. These predetermined asset values can be chosen by the provider of the security audit system or the user.
  • the host's operating system and services are identified during the scan performed in step 215 .
  • the asset value assigned to the host's particular operating system is retrieved.
  • respective asset values are retrieved for the host's services and relevant vulnerabilities.
  • the highest of these three asset values is selected in step 420 and used as the asset value for the host in computing the risk values in FIG. 3.
  • other processes such as averaging the asset values, may be used to designate the significance of a particular host in a network 110 .
  • FIG. 5 illustrates an exemplary method for calculating risk values for the vulnerabilities associated with a host, as referred to in step 320 of FIG. 3.
  • the active scan engine 120 selects the first vulnerability discovered on the current host.
  • the active scan engine 120 retrieves the asset value for the current host calculated in FIG. 4.
  • the active scan engine 120 retrieves a value representing the probability of a successful exploit against the current vulnerability in step 515 .
  • Each vulnerability has one or more exploit methods associated with it. The likelihood of a successful exploit is related to the difficulty of the exploit method. For example, certain vulnerabilities are easily exploited through the use of a simple, publicly available script. An easily exploited vulnerability is assigned a relatively high exploit probability value.
  • the active scan engine 120 To retrieve a vulnerability's exploit probability value, the active scan engine 120 first retrieves the vulnerability's exploit method. The active scan engine 120 then consults a table that maps exploit methods to probability values. As outlined above, these values are assigned on the basis of the difficulty of each method. If a vulnerability has multiple exploit methods, the method with the highest exploit probability is selected.
  • step 520 the active scan engine 120 retrieves a predetermined severity value for the current vulnerability. This value represents the impact of a successful exploit of the vulnerability.
  • the risk is calculated as the product of the host asset value and the vulnerability's severity and exploit probability values. Alternative embodiments of the present invention may weigh the three factors differently or use less than all three values in calculating the risk value.
  • step 530 the active scan engine 120 adjusts the calculated risk value to take into account the difficulty of fixing the current vulnerability. The user can choose not to incorporate the fix difficulty factor and instead, use the “pure” risk value.
  • step 530 the count of vulnerabilities assigned to the risk band that contains the adjusted risk value is incremented.
  • step 540 the active scan engine 120 retrieves the next vulnerability detected on the current host. If there is such a vulnerability, the process 320 returns to step 515 . Otherwise, the calculation and accumulation of risk values for the host is complete.
  • step 605 the active scan engine 120 retrieves a fix difficulty value for the vulnerability.
  • the fix difficulty value is a measure of the difficulty of remedying a vulnerability.
  • Each vulnerability has associated with it one or more fix methods.
  • the active scan engine 120 first retrieves the vulnerability's fix method.
  • the active scan engine 120 then consults a table that maps each fix method to a difficulty value. This mapping table is typically created by network security personnel for use by the security audit system 115 .
  • step 610 the risk value is multiplied by the fix difficulty value to yield an adjusted risk value.
  • the adjusted risk value for the vulnerability can be compared to other adjusted risk values and ranked from highest to lowest.
  • a user of the security audit system can address those that are easier to fix first.
  • the adjusted risk value can also be used to calculate the security score so that an element's security score will reflect the difficulty with which its vulnerabilities can be fixed.
  • FIG. 7 illustrates an exemplary method for assigning a risk value to a risk band, and for incrementing the count of vulnerabilities assigned to the band, as referred to in step 535 of FIG. 5.
  • a risk scale typically comprises several bands selected by the user.
  • the count C i of vulnerabilities assigned to band i is incremented by 1.
  • FIG. 8A and FIG. 8B illustrate an exemplary method for calculating a security score as referred to in Step 325 of FIG. 3.
  • the illustrated exemplary method employs a logarithmic band calculation so that security scores can be accurately compared over the entire network 110 .
  • Using the logarithmic band calculation prevents a host with a large number of low risk values from achieving a higher security score than a host with a few higher risk values.
  • risk values R 1 , R 2 , R 3 , and R 4 are placed on a scale 800 that is divided into three bands.
  • the number and width of the bands is arbitrary and can be varied to suit the needs and sensitivity of the network.
  • r i(max) is equal to 0.6, the upper boundary of the highest band containing a risk value.
  • the first term, r i(max) ⁇ 1 is 0.2, the lower boundary of the highest band containing a risk value.
  • the remainder of the formula is a fraction of the middle band calculated from the band values encompassing the risk values placed on the scale 800 .
  • the result of this calculation is that the security score will not exceed the upper boundary of the highest risk band, in this instance 0.6.
  • the exemplary formula shown in FIG. 8A is merely one way of calculating a security score and alternative embodiments of the present invention may employ other formulas for the calculation.
  • FIG. 8B an exemplary method for calculating a security score using the band calculation approach is illustrated.
  • This exemplary method shows the calculation of a security score for a particular host in a network.
  • This exemplary method can also be adapted to calculate a security score for a group of hosts within a network.
  • the active scan engine 120 queries for the existence of vulnerabilities for the current host. If there are no vulnerabilities associated with the host, the security score is set to zero in step 810 . If there are vulnerabilities, the “yes” branch is followed to step 815 , where the active scan engine 120 determines the index of the highest-risk band that has at least one vulnerability's risk value assigned to it. As illustrated in FIG.
  • the lowest band contains one risk value and the second band contains three risk values.
  • the highest risk band which contains at least one risk value is identified as band b i(max) .
  • band b i(max) is the middle band bounded by 0.2 and 0.6 on the risk scale.
  • an embodiment of the current invention implements a simplified version of the band calculation formula. This simplified calculation is accomplished in steps 820 and 825 . In step 820 , the simplified summation calculation yields preliminary score s.
  • the security score is computed by multiplying the summation value by the fraction (r i(max) ⁇ r i(max) ⁇ 1 )/(r i(max)+ r i(max) ⁇ 1 ), and adding r i(max) ⁇ 1 , as noted in the formula above.
  • other methods may be used to sum the risk values to get an accumulated security score.
  • FIG. 9 illustrates an exemplary method for determining the highest-risk band in which a risk value is present.
  • the second band is band b i(max) because there are no risk values in the upper region between 0.6 and 1.0.
  • the index is set to the highest band risk.
  • the active scan engine 120 determines if at least one risk value has been assigned to the current band. If so, the current band index is the desired one and the process is complete. Otherwise, the current index is decremented in step 920 and the process 815 returns to step 910 .
  • FIG. 10 illustrates an exemplary process for summing the banded vulnerability risk values as referenced in step 820 .
  • the calculation is initialized by setting the current band index i equal to b i(max) .
  • the preliminary security score s is set to 0 . 0 .
  • the value PreviousCount which represents the number of risk values that have already been processed, is set to 0 .
  • the value StartIndex which represents the index of the first risk value in the current band, is set to 1.
  • step 1010 if the current band is band b min , the process is complete. Otherwise, control passes to step 1015 , where a value n is set equal to the count of risks C i assigned to the current band plus the value PreviousCount.
  • the preliminary score s is incremented by (r i +r i ⁇ 1 )*(2 n ⁇ Startndex+1 ⁇ 1.0)/2 n .
  • the values StarIndex and PreviousCount are then incremented by C i .
  • the current band index i is then decremented by 1, and the process 820 returns to step 1010 .
  • the present invention enables and supports security auditing of a distributed computing network by providing a useful numerical value of the risk associated with a vulnerability or group of vulnerabilities.
  • the security audit system can collect information about the elements of a network and compute a risk value for vulnerabilities detected therein.
  • the risk value can be based on the importance of the network element, the likelihood of exploit, and the potential for damage to the network in the event the vulnerability is exploited.
  • the risk value can also be adjusted to reflect the difficulty of remedying the vulnerability.
  • the security audit system can also collect risk values for a particular element and compute a total security score for the element.
  • the security audit system uses a banded calculation method to ensure that a host with several low risk values does not have a higher security score than a host with a few high risk values. Security scores are useful for comparing individual elements or groups of elements on the network.

Abstract

Calculating risk based on information collected during a security audit of a computing network. The computer network is surveyed to determine the significance of elements in the network and to identify vulnerabilities associated with the elements. Using this information, the security audit system calculates a risk value for each vulnerability. The risk value is a function of the asset value, the probability that the vulnerability will be exploited, and the potential severity of damage to the network if the vulnerability is exploited. The risk value can be adjusted based on the ease with which the vulnerability can be fixed. A network element may have one or more risk values associated with it based on one or more vulnerabilities. The security audit system employs a band calculation method for summing risk values and computing a single security score for the element. The band calculation method can also be used to produce a security score for a group of elements. The band calculation method produces a more accurate score for comparing elements and groups of elements throughout a network.

Description

    PRIORITY AND RELATED APPLICATIONS
  • The present application claims priority to provisional patent application entitled, “Method and System for Configuring and Scheduling Security Audits of a Computer Network,” filed on Jan. 31, 2001 and assigned U.S. Application Serial No. 60/265,519. The present application also references and incorporates herein a related U.S. non-provisional patent application entitled, “Method and System for Configuring and Scheduling Security Audits of a Computer Network,” filed concurrently herewith and having attorney docket number[0001]
  • TECHNICAL FIELD
  • The present invention is generally directed to managing the security of a network. More specifically, the present invention facilitates computing a security score for elements in a distributed computing network. [0002]
  • BACKGROUND OF THE INVENTION
  • The security of computing networks is an increasingly important issue. With the growth of wide area networks (WANs), such as the Internet and the World Wide Web, people rely on computing networks to transfer and store an increasing amount of valuable information. This is also true of local area networks (LANs) used by companies, schools, organizations, and other enterprises. LANs typically are used by a bounded group of people in an organization to communicate and store electronic documents and information. LANs generally are coupled to or provide access to other local or wide area networks. Greater use and availability of computing networks produces a corresponding increase in the size and complexity of computing networks. [0003]
  • With the growth of networks and the importance of information available on the networks, there is also a need for better and more intelligent security. One approach to securing larger and more complex computer networks is to use a greater number and variety of security assessment devices. Security assessment devices can be used to evaluate elements in the network, such as desktop computers, servers, and routers, and to determine their respective vulnerability to security problems, such as an attack from hackers. Security assessment devices can also be used more frequently to monitor the activity or status of the elements in a computing network. These network elements are commonly referred to as hosts. Throughout this specification the terms “host” and “element” will be used interchangeably to refer to the various components that can be found in a distributed computing network. [0004]
  • However, simply increasing the number of security assessment devices and the frequency with which they are used does not solve the problems presented in conventional network security. With increased security activity, a network administrator or other user must decide which elements in the network need to be audited, how frequently they should be audited, and what checks need to be run. These are decisions that often involve a variety of complicated factors and they are decisions that in practicality cannot be made every time a security audit is conducted. Increased assessment also produces a corresponding increase in the amount of security data that must be analyzed. A network administrator that is overwhelmed with security data is unable to make intelligent decisions about which security vulnerabilities should be addressed first. [0005]
  • An additional difficulty associated with maintaining adequate network security is finding the time to conduct security audits. Security audits generally must be initiated by a security professional and can hinder or entirely interrupt network performance for several hours at a time. These limitations place a premium on the time available to conduct security auditing and maintenance. Conventional network security systems do not support a means to accurately quantify security vulnerabilities so that they can be easily compared and prioritized. [0006]
  • In view of the foregoing, there is a need in the art for a system that will support the auditing of a distributed computing network. Specifically, a need exists to be able to automatically survey a network and prioritize any security issues identified by the survey. A further need exists to be able to assess the security risk of each element in the network. The assessment should reflect the importance of the element and, for each security vulnerability that exists on the element, the ease with which the vulnerability can be exploited, and the impact of exploiting the vulnerability. Moreover, a need exists to accurately quantify the risk posed by vulnerabilities so that they can be compared in association with a particular host and so that hosts can be compared over the entire network. [0007]
  • SUMMARY OF THE INVENTION
  • The present invention satisfies the above-described needs by providing a system and quantitative method for evaluating the security of elements in a network. A security audit system can collect data concerning elements in a network. This data can include the operating system and services running on the element and any vulnerabilities associated therewith. This information can be used to calculate a risk for each vulnerability associated with an element. Certain elements may have few vulnerabilities and other elements may have many vulnerabilities. In order to give each element a meaningful security score, a banded calculation method is used. The banded calculation method prevents many low-risk vulnerabilities associated with one element from overshadowing an element with a single high-risk vulnerability. This approach provides a simple means for a user to identify and address high-risk issues in a network. [0008]
  • In one aspect, the present invention comprises a method for computing a security score associated with a host in a distributed computing network. A security audit system can select a vulnerability identified in a host and obtain an asset value for the host. The asset value is typically assigned to the host based on its characteristics and functions. The security audit system can also retrieve an exploit probability and a severity value for the vulnerability. Security personnel generally consider the various types of vulnerabilities and select predetermined exploit probabilities and severity values. A risk value for a vulnerability can be computed from the host asset value, the exploit probability of the vulnerability, and the vulnerability's severity value. The risk value computation can be repeated for other vulnerabilities identified in the network. Because an element typically has multiple vulnerabilities, it is also useful to be able to compute a total security score for the element. The security audit system can use a banded calculation model to compute the total security score by placing the risk values in selected bands on a risk scale. The banded calculation model prevents several low risk values from being summed and producing a disproportionately and inaccurately large security score. [0009]
  • In another aspect, the present invention provides a method for computing a risk value for quantifying a vulnerability identified in a network. A network security system can receive an asset value for an element on which the vulnerability is detected. The asset value can be based on information collected during a security audit of the element. The network security system can also receive a predetermined exploit probability and severity value for the vulnerability. Taking the asset value, the exploit probability, and the severity value, the network security system can compute a risk value that is useful in comparing other vulnerabilities in the network. The risk value can also be adjusted by a factor that reflects the difficulty of remedying the vulnerability. [0010]
  • These and other aspects of the invention will be described below in connection with the drawing set and the appended specification and claim set.[0011]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram illustrating an exemplary architecture for operating an embodiment of the present invention. [0012]
  • FIG. 2 is a logic flow diagram illustrating an overview of the operating steps performed by a security audit system in accordance with an exemplary embodiment of the present invention. [0013]
  • FIG. 3 is a logic flow diagram illustrating an exemplary process for analyzing the results of a security audit scan. [0014]
  • FIG. 4 is a logic flow diagram illustrating an exemplary process for calculating an asset value for a host. [0015]
  • FIG. 5 is a logic flow diagram illustrating an exemplary process for calculating a risk value for a vulnerability, and for accumulating these risk values for a single host. [0016]
  • FIG. 6 is a logic flow diagram illustrating an exemplary process for adjusting a vulnerability's calculated risk value as a function of the difficulty of fixing the vulnerability. [0017]
  • FIG. 7 is logic flow diagram illustrating an exemplary process for assigning a vulnerability's risk value to a risk band, and for incrementing the count of vulnerabilities assigned to the band. [0018]
  • FIG. 8A is a diagram illustrating a representative example of a banded scale useful for calculating a security score from one or more risk values. [0019]
  • FIG. 8B is a logic flow diagram illustrating an exemplary process for calculating a security score from the banded scale. [0020]
  • FIG. 9 is a logic flow diagram illustrating an exemplary process for determining the highest-risk band with at least one vulnerability risk value assigned to it. [0021]
  • FIG. 10 is a logic flow diagram illustrating an exemplary process for summing the risk values in each band on the banded scale.[0022]
  • DETAILED DESCRIPTION OF THE EXEMPLARY EMBODIMENTS
  • The present invention supports the assessment of the security risks of a computing network by providing a precise means to calculate and compare the risks posed by security vulnerabilities. Specifically, the present invention allows a security auditing system to identify security vulnerabilities in various elements throughout a network. The security auditing system also can collect information about the function and importance of elements in a computing network. Using this information, the invention calculates a risk value for each security vulnerability that is identified. The risk value can be prioritized based on the ease with which the vulnerability can be repaired. Prioritizing risk values for a particular network element assists a user or network administrator in deciding which vulnerabilities to address first. The invention also supports the calculation of a security score for a network element that accumulates the risk values of each vulnerability associated with the element. For example, employing a band calculation method ensures that a large number of low-risk vulnerabilities does not produce a higher security score than a smaller number of high-risk vulnerabilities. Calculating a security score for each element with the band calculation method allows for a more meaningful comparison of elements across a network. [0023]
  • Although the exemplary embodiments will be generally described in the context of software modules running in a distributed computing environment, those skilled in the art will recognize that the present invention also can be implemented in conjunction with other program modules for other types of computers. In a distributed computing environment, program modules may be physically located in different local and remote memory storage devices. Execution of the program modules may occur locally in a stand-alone manner or remotely in a client/server manner. Examples of such distributed computing environments include local area networks of an office, enterprise-wide computer networks, and the global Internet. [0024]
  • The detailed description that follows is represented largely in terms of processes and symbolic representations of operations in a distributed computing environment by conventional computer components, including database servers, application servers, mail servers, routers, security devices, firewalls, clients, workstations, memory storage devices, display devices, and input devices. Each of these conventional distributed computing components is accessible via a communications network, such as a wide area network or local area network. [0025]
  • The processes and operations performed by the computer include the manipulation of signals by a client or server and the maintenance of these signals within data structures resident in one or more of the local or remote memory storage devices. Such data structures impose a physical organization upon the collection of data stored within a memory storage device and represent specific electrical or magnetic elements. These symbolic representations are the means used by those skilled in the art of computer programming and computer construction to most effectively convey teachings and discoveries to others skilled in the art. [0026]
  • The present invention also includes a computer program that embodies the functions described herein and illustrated in the appended flow charts. However, it should be apparent that there could be many different ways of implementing the invention in computer programming, and the invention should not be construed as limited to any one set of computer program instructions. Further, a skilled programmer would be able to write such a computer program to implement the disclosed invention based on the flow charts and associated description in the application text, for example. Therefore, disclosure of a particular set of program code instructions is not considered necessary for an adequate understanding of how to make and use the invention. The inventive functionality of the claimed computer program will be explained in more detail in the following description in conjunction with the remaining figures illustrating the program flow. [0027]
  • Referring now to the drawings, in which like numerals represent like elements throughout the several figures, aspects of the present invention and the preferred operating environment will be described. [0028]
  • FIG. 1 illustrates various aspects of an exemplary computing environment in which an embodiment of the present invention is designed to operate. Those skilled in the art will appreciate that FIG. 1 and the associated discussion are intended to provide a general description of representative computer network resources in an exemplary distributed computer environment including the inventive security audit system. The architecture comprises a [0029] console 105 and a security audit system 115 which are used to configure and schedule security audits of a network 110. The console 105 communicates information about the current security state of the network 110 to a user. The console 105 typically comprises a graphical user interface for presenting and managing data in a convenient format for the user. The console 105 is also operable for receiving information from the security audit system 115 and allowing control of the security audit system 115. The security audit system 115 comprises an active scan engine 120 and one or more other scan engines. In the exemplary embodiment illustrated in FIG. 1, the active scan engine 120 is coupled to an Internet scanning engine 130, a system scanning engine 150, and a database scanning engine 140. Each of these scan engines illustrated in FIG. 1 is coupled to a corresponding database.
  • The active scan engine's [0030] 120 primary task is acquiring and maintaining current data about the configuration and security posture of the network 110. The active scan engine 120 utilizes the subsidiary scan engines 130, 140 and 150 as a means for gathering information about the network 110. The network 110 typically comprises elements such as desktop computers, routers, and various servers. The active scan engine 120 is responsible for coordinating the configuration, scheduling, and running of scans of these elements found in the network 110. Typically, the active scan engine 120 is continuously running so that the scheduled scans can be run at their designated times, and the resultant data processed in a timely manner.
  • Referring to FIG. 2, an overview of an exemplary [0031] security auditing process 200 is shown. In alternative embodiments of the present invention, different auditing steps can be performed to collect information about a network that is used to compute a security score. In step 205, an active scan engine 120 configures scans that are to be run on a network 110. In step 210, the active scan engine schedules the times at which the various configured scans will be run on the network 110. An exemplary method for configuring and scheduling scans is described in greater detail in the U.S. non-provisional patent application filed concurrently herewith and referenced herein. When one of the scheduled times for running a scan is reached, the active scan engine 120 will run that scan on the network 110 in step 215. A scan may be run against particular hosts in the network or over the entire network 110. Typically, a scan collects information about the function of the hosts on the network and their respective vulnerabilities. This information is gathered, analyzed, and used to compute a security score for each host or element in the network in step 220. The security scores assist a user or network administrator in determining which vulnerabilities should be addressed first.
  • FIG. 3 illustrates an exemplary process for analyzing the results of a security scan, as referenced in [0032] step 220, for hosts located on the network 110. In step 305, the active scan engine 120 selects the ID of the first scan for which data are available. In step 310, the active scan engine 120 selects the ID of the first host for which data are available in the current scan job results. In step 315, the active scan engine 120 calculates an asset value for the current host. Asset values are calculated based on the operating system and services associated with the host. An asset value is a characteristic representing the importance of a particular host or element in the operation of the network. In step 320, the active scan engine computes a risk value for each vulnerability detected on the current host. The risk value quantifies the risk a particular vulnerability presents for a network. As will be discussed in connection with FIGS. 7 and 8A, each risk value calculated for a vulnerability is assigned to a band on the risk scale. Using the number of risk values assigned to each band, the active scan engine 120 computes a security score for the current host, in step 325.
  • In [0033] step 330, the active scan engine 120 determines if there are more hosts in the current job to be processed. If there are more hosts, the ID of the next host is retrieved in step 335, and the process 220 returns to step 315. In step 330, if there are no more hosts to process in the current job, the active scan engine 120 determines if there are more scan jobs to process in step 340. If there are more scan jobs, the ID of the next scan job is retrieved in step 340, and the process returns to step 310. In step 340, if the active scan engine 120 finds that there are no more hosts to process, the analysis is complete.
  • FIG. 4 illustrates an exemplary method for calculating an asset value as referred to in [0034] step 315 of FIG. 3. Predetermined asset values are generally assigned for the various operating systems, host services, and the vulnerabilities that are likely to be encountered in a scan of a network. These predetermined asset values can be chosen by the provider of the security audit system or the user. The host's operating system and services are identified during the scan performed in step 215. In step 405, the asset value assigned to the host's particular operating system is retrieved. In steps 410 and 415, respective asset values are retrieved for the host's services and relevant vulnerabilities. In the exemplary calculation illustrated herein, the highest of these three asset values is selected in step 420 and used as the asset value for the host in computing the risk values in FIG. 3. In alternative embodiments of the present invention, other processes, such as averaging the asset values, may be used to designate the significance of a particular host in a network 110.
  • FIG. 5 illustrates an exemplary method for calculating risk values for the vulnerabilities associated with a host, as referred to in [0035] step 320 of FIG. 3. In step 505 the active scan engine 120 selects the first vulnerability discovered on the current host. In step 510, the active scan engine 120 retrieves the asset value for the current host calculated in FIG. 4. The active scan engine 120 retrieves a value representing the probability of a successful exploit against the current vulnerability in step 515. Each vulnerability has one or more exploit methods associated with it. The likelihood of a successful exploit is related to the difficulty of the exploit method. For example, certain vulnerabilities are easily exploited through the use of a simple, publicly available script. An easily exploited vulnerability is assigned a relatively high exploit probability value. On the other hand, other vulnerabilities are very difficult to exploit and involve a complex attack, such as the use of a buffer overflow. Because a buffer overflow is a difficult exploit method to implement, it is assigned a relatively low probability value. To retrieve a vulnerability's exploit probability value, the active scan engine 120 first retrieves the vulnerability's exploit method. The active scan engine 120 then consults a table that maps exploit methods to probability values. As outlined above, these values are assigned on the basis of the difficulty of each method. If a vulnerability has multiple exploit methods, the method with the highest exploit probability is selected.
  • In [0036] step 520, the active scan engine 120 retrieves a predetermined severity value for the current vulnerability. This value represents the impact of a successful exploit of the vulnerability. In step 525, the risk is calculated as the product of the host asset value and the vulnerability's severity and exploit probability values. Alternative embodiments of the present invention may weigh the three factors differently or use less than all three values in calculating the risk value. In step 530, the active scan engine 120 adjusts the calculated risk value to take into account the difficulty of fixing the current vulnerability. The user can choose not to incorporate the fix difficulty factor and instead, use the “pure” risk value. In step 530, the count of vulnerabilities assigned to the risk band that contains the adjusted risk value is incremented. In step 540, the active scan engine 120 retrieves the next vulnerability detected on the current host. If there is such a vulnerability, the process 320 returns to step 515. Otherwise, the calculation and accumulation of risk values for the host is complete.
  • Referring to FIG. 6, an exemplary process is illustrated for adjusting a risk value as referred to in [0037] step 530 of FIG. 5. In step 605, the active scan engine 120 retrieves a fix difficulty value for the vulnerability. The fix difficulty value is a measure of the difficulty of remedying a vulnerability. Each vulnerability has associated with it one or more fix methods. To retrieve a fix difficulty value for a vulnerability, the active scan engine 120 first retrieves the vulnerability's fix method. The active scan engine 120 then consults a table that maps each fix method to a difficulty value. This mapping table is typically created by network security personnel for use by the security audit system 115. In step 610, the risk value is multiplied by the fix difficulty value to yield an adjusted risk value. In step 615, the adjusted risk value for the vulnerability can be compared to other adjusted risk values and ranked from highest to lowest. Using this exemplary method, when multiple vulnerabilities have the same computed risk, a user of the security audit system can address those that are easier to fix first. The adjusted risk value can also be used to calculate the security score so that an element's security score will reflect the difficulty with which its vulnerabilities can be fixed.
  • FIG. 7 illustrates an exemplary method for assigning a risk value to a risk band, and for incrementing the count of vulnerabilities assigned to the band, as referred to in [0038] step 535 of FIG. 5. A risk scale, as described in connection with FIG. 8, typically comprises several bands selected by the user. In step 705, the active scan engine 120 identifies the band i, such that ri>=r(v)>ri−1, where ri denotes the maximum risk value of band i, ri−1 denotes the maximum risk value of band i−1, and r(v) denotes the risk of the current vulnerability. In step 710, the count Ci of vulnerabilities assigned to band i is incremented by 1.
  • FIG. 8A and FIG. 8B illustrate an exemplary method for calculating a security score as referred to in [0039] Step 325 of FIG. 3. The illustrated exemplary method employs a logarithmic band calculation so that security scores can be accurately compared over the entire network 110. Using the logarithmic band calculation prevents a host with a large number of low risk values from achieving a higher security score than a host with a few higher risk values. In the illustration shown in FIG. 8A, risk values R1, R2, R3, and R4 are placed on a scale 800 that is divided into three bands. The number and width of the bands is arbitrary and can be varied to suit the needs and sensitivity of the network. The formula illustrated in FIG. 8A produces a security score that is a function of the band boundary values as opposed to the risk values. Using the exemplary risk values shown on the scale 800, ri(max) is equal to 0.6, the upper boundary of the highest band containing a risk value. In the exemplary formula, Security Score = r i ( max ) - 1 + r i ( max ) - r i ( max ) - 1 r i ( max ) + r i ( max ) - 1 k = 1 R r i ( k ) + r i ( k ) - 1 2 k
    Figure US20020147803A1-20021010-M00001
  • the first term, r[0040] i(max)−1, is 0.2, the lower boundary of the highest band containing a risk value. The remainder of the formula is a fraction of the middle band calculated from the band values encompassing the risk values placed on the scale 800. The result of this calculation is that the security score will not exceed the upper boundary of the highest risk band, in this instance 0.6. The exemplary formula shown in FIG. 8A is merely one way of calculating a security score and alternative embodiments of the present invention may employ other formulas for the calculation.
  • Referring to FIG. 8B, an exemplary method for calculating a security score using the band calculation approach is illustrated. This exemplary method shows the calculation of a security score for a particular host in a network. This exemplary method can also be adapted to calculate a security score for a group of hosts within a network. Beginning with [0041] step 805, the active scan engine 120 queries for the existence of vulnerabilities for the current host. If there are no vulnerabilities associated with the host, the security score is set to zero in step 810. If there are vulnerabilities, the “yes” branch is followed to step 815, where the active scan engine 120 determines the index of the highest-risk band that has at least one vulnerability's risk value assigned to it. As illustrated in FIG. 8A, the lowest band contains one risk value and the second band contains three risk values. In step 815, the highest risk band which contains at least one risk value is identified as band bi(max). In the example shown in FIG. 8A, band bi(max) is the middle band bounded by 0.2 and 0.6 on the risk scale. As noted in FIG. 8A, an embodiment of the current invention implements a simplified version of the band calculation formula. This simplified calculation is accomplished in steps 820 and 825. In step 820, the simplified summation calculation yields preliminary score s. In step 825, the security score is computed by multiplying the summation value by the fraction (ri(max)−ri(max)−1)/(ri(max)+ri(max)−1), and adding ri(max)−1, as noted in the formula above. In alternative embodiments of the present invention other methods may be used to sum the risk values to get an accumulated security score.
  • FIG. 9 illustrates an exemplary method for determining the highest-risk band in which a risk value is present. In the example shown in FIG. 8A, the second band is band b[0042] i(max) because there are no risk values in the upper region between 0.6 and 1.0. In step 905, the index is set to the highest band risk. In step 910, if the index is equal to bmin, the lowest risk band, the process ends. Otherwise, in step 915 the active scan engine 120 determines if at least one risk value has been assigned to the current band. If so, the current band index is the desired one and the process is complete. Otherwise, the current index is decremented in step 920 and the process 815 returns to step 910.
  • FIG. 10 illustrates an exemplary process for summing the banded vulnerability risk values as referenced in [0043] step 820. In step 1005, the calculation is initialized by setting the current band index i equal to bi(max). The preliminary security score s is set to 0.0. The value PreviousCount, which represents the number of risk values that have already been processed, is set to 0. The value StartIndex, which represents the index of the first risk value in the current band, is set to 1. In step 1010, if the current band is band bmin, the process is complete. Otherwise, control passes to step 1015, where a value n is set equal to the count of risks Ci assigned to the current band plus the value PreviousCount. The preliminary score s is incremented by (ri+ri−1)*(2n−Startndex+1−1.0)/2n. The values StarIndex and PreviousCount are then incremented by Ci. The current band index i is then decremented by 1, and the process 820 returns to step 1010.
  • In conclusion, the present invention enables and supports security auditing of a distributed computing network by providing a useful numerical value of the risk associated with a vulnerability or group of vulnerabilities. The security audit system can collect information about the elements of a network and compute a risk value for vulnerabilities detected therein. The risk value can be based on the importance of the network element, the likelihood of exploit, and the potential for damage to the network in the event the vulnerability is exploited. The risk value can also be adjusted to reflect the difficulty of remedying the vulnerability. The security audit system can also collect risk values for a particular element and compute a total security score for the element. The security audit system uses a banded calculation method to ensure that a host with several low risk values does not have a higher security score than a host with a few high risk values. Security scores are useful for comparing individual elements or groups of elements on the network. [0044]
  • It will be appreciated that the present invention fulfills the needs of the prior art described herein and meets the above-stated objects. While there has been shown and described the preferred embodiment of the invention, it will be evident to those skilled in the art that various modifications and changes may be made thereto without departing from the spirit and the scope of the invention as set forth in the appended claims and equivalence thereof. Although the present invention has been described as operating on a local area network, it should be understood that the invention can be applied to other types of distributed computing environments. Furthermore, it should be readily apparent that portions of the calculation can be varied in order modify the results without departing from the scope of the invention. [0045]

Claims (49)

What is claimed is:
1. A method for assessing the security of a system comprising:
selecting a vulnerability for the system;
obtaining an asset value for the system;
determining an exploit probability for the vulnerability;
obtaining a severity value for the vulnerability;
computing a risk value for the vulnerability based on at least one of the asset value, the exploit probability, and the severity value;
if there are additional vulnerabilities associated with the system, repeating the foregoing steps to compute risk values for the additional vulnerabilities; and
calculating a security score for the system based on at least one of the risk values associated with the system.
2. The method of claim 1, further comprising the step of calculating an adjusted risk value as a function of the risk value and a fix difficulty value.
3. The method of claim 2, further comprising the step of calculating an adjusted security score for the system based on at least one adjusted risk value.
4. The method of claim 1, further comprising the step of using the security score to assess the need for repair of the system.
5. The method of claim 1, further comprising calculating a group security score for a group of systems based on individual security scores for each of the systems.
6. The method of claim 1, wherein the asset value is obtained from at least one of an operating system, a system service, and the system vulnerabilities.
7. The method of claim 1, wherein the severity value is based on the potential access available to the system from exploiting the vulnerability.
8. The method of claim 1, wherein the step of calculating a risk value comprises multiplying the asset value, the probability of exploit value, and the severity value.
9. The method of claim 1, wherein the step of calculating a security score comprises placing a risk value on a banded scale.
10. A computer-readable medium having computer-executable instructions for performing the steps recited in claim 1.
11. A method for computing a security score associated with a host in a distributed computing network comprising:
selecting a vulnerability for the host, the vulnerability being identified during a security scan;
obtaining an asset value for the host, the asset value obtained from at least one of a host operating system, a host service, and the host vulnerabilities;
determining an exploit probability for the vulnerability, the exploit probability indicating the likelihood that the vulnerability will be exploited to compromise the host;
obtaining a severity value for the vulnerability, the severity value characterizing the potential damage that can be done from exploiting the vulnerability;
computing a risk value for the vulnerability based on at least one of the asset value, the exploit probability, and the severity value;
computing an adjusted risk value as a function of the risk value and a fix difficulty value, the fix difficulty value indicating the difficulty of remedying the vulnerability associated with the risk;
if there are additional vulnerabilities associated with the system, repeating the foregoing steps to compute adjusted risk values for the additional vulnerabilities; and
calculating an adjusted security score for the host based on at least one of the adjusted risk values associated with the host.
12. The method of claim 11, further comprising the step of using the adjusted security score to decide when to fix a host.
13. The method of claim 11, further comprising calculating a group adjusted security score for a group of hosts based on individual adjusted security scores.
14. The method of claim 11, wherein the severity value is based on the potential access available to the network from exploiting the vulnerability.
15. The method of claim 11, wherein the step of computing a risk value comprises multiplying the asset value, the probability value, and the severity value.
16. The method of claim 11, wherein the step of calculating a security score comprises placing a risk value on a banded scale.
17. A computer-implemented medium having computer-executable instructions for performing the steps recited in claim 11.
18. A method for determining a risk value for a vulnerability detected by a security audit system in a network comprising:
receiving an asset value from the security audit system for an element with which the vulnerability is associated;
receiving an exploit probability value for the vulnerability from the security audit system;
receiving a severity value from the security audit system; and
computing a risk value for the vulnerability, the computation comprising at least one of the asset value, the exploit probability value, and the severity value.
19. The method of claim 18, further comprising the step of computing a risk value for additional vulnerabilities associated with the element by repeating the foregoing steps.
20. The method of claim 18, further comprising the step of calculating a security score from at least one of the risk values associated with the element.
21. The method of claim 18, further comprising the step of computing an adjusted risk value as a function of the risk value and a fix difficulty value.
22. The method of claim 21, further comprising the step of calculating an adjusted security score from at least one adjusted risk value.
23. The method of claim 20, further comprising the step of calculating a group security score for a group of elements based on individual security scores.
24. The method of claim 18, wherein the asset value is based on at least one of a host operating system, a host service, and the host vulnerabilities.
25. The method of claim 18, wherein the severity value is based on the potential access available to the network from exploiting the vulnerability.
26. The method of claim 18, wherein the step of calculating a risk value comprises multiplying the asset value, the probability of exploit value, and the severity value.
27. The method of claim 18, wherein the step of calculating a security score comprises placing a risk value on a banded scale.
28. A computer-readable medium having computer-executable instructions for performing the steps recited in claim 18.
29. A method for computing a risk value associated with an element in a network comprising:
receiving a vulnerability for the element, the vulnerability being identified by a security audit system;
receiving an asset value for the element from the security audit system, wherein the asset value is based on at least one of an operating system, an element service, and the element vulnerabilities;
receiving an exploit probability value for the vulnerability from the security audit system;
receiving a severity value from the security audit system; and
computing a risk value for the vulnerability, the computation comprising at least one of the asset value, the exploit probability value, and the severity value.
30. The method of claim 29, further comprising the step of computing a risk value for additional vulnerabilities associated with the element by repeating the foregoing steps.
31. The method of claim 30, further comprising the step of calculating a security score from at least one of the risk values associated with the element.
32. The method of claim 29, further comprising the step of computing an adjusted risk value as a function of the risk value and a fix difficulty value.
33. The method of claim 32, further comprising the step of calculating an adjusted security score from at least one adjusted risk value.
34. The method of claim 31, further comprising the step of calculating a group security score for a group of elements based on individual security scores.
35. The method of claim 29, wherein the step of calculating a risk value comprises multiplying the asset value, the probability of exploit value, and the severity value.
36. The method of claim 29, wherein the step of calculating a security score comprises placing a risk value on a banded scale.
37. A computer-readable medium having computer-executable instructions for performing the steps recited in claim 29.
38. A computer-readable medium having computer-executable instructions for performing steps comprising:
receiving a vulnerability for a host, the vulnerability being identified during a security scan;
obtaining an asset value for the host, the asset value based on at least one of a host operating system, a host service, and the host vulnerability;
determining an exploit probability for the vulnerability;
obtaining a severity value for the vulnerability;
computing a risk value for the vulnerability based on at least one of the asset value, the exploit probability, and the severity value;
computing an adjusted risk value as a function of the risk value and a fix difficulty value;
if there are additional vulnerabilities associated with the system, repeating the foregoing steps to compute adjusted risk values for the additional vulnerabilities; and
calculating an adjusted security score for the host based on at least one of the adjusted risk values associated with the host.
39. The computer-readable medium of claim 38, having further computer-executable instructions for performing the step of using the adjusted security score to decide when to fix a host.
40. The computer-readable medium of claim 38, having further computer-executable instructions for performing the step of calculating a group adjusted security score for a group of hosts based on individual adjusted security scores.
41. The computer-readable medium of claim 38, having further computer-executable instructions for performing the step of computing a risk value by multiplying the asset value, the probability value, and the severity value.
42. The computer-readable medium of claim 38, having further computer-executable instructions for performing the step of calculating a security score by placing a risk value on a banded scale.
43. A system for computing a security score associated with a security audit of a distributed computing system comprising:
an manager software module operable for selecting a vulnerability for a host;
a storage module operable for storing an asset value for the host, an exploit probability for the vulnerability, and a severity value for the vulnerability; and
a computation module operable for computing a risk value.
44. The system of claim 43, wherein the asset value for the host is based on at least one of the host's operating system, the host's services, and the host's vulnerabilities.
45. The system of claim 43, wherein computing the risk value is based on at least one of the asset value, the exploit probability, and the severity value.
46. The system of claim 43, wherein the computation module is further operable for computing risk values for multiple vulnerabilities.
47. The system of claim 46, wherein the computation module is further operable for computing a security score from multiple vulnerabilities.
48. The system of claim 46, wherein the computation module computes a security score by placing multiple risk values on a banded risk scale.
49. The system of claim 47, wherein the computation module is further operable for computing a group security score from multiple security scores.
US10/066,461 2001-01-31 2002-01-31 Method and system for calculating risk in association with a security audit of a computer network Abandoned US20020147803A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/066,461 US20020147803A1 (en) 2001-01-31 2002-01-31 Method and system for calculating risk in association with a security audit of a computer network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US26551901P 2001-01-31 2001-01-31
US10/066,461 US20020147803A1 (en) 2001-01-31 2002-01-31 Method and system for calculating risk in association with a security audit of a computer network

Publications (1)

Publication Number Publication Date
US20020147803A1 true US20020147803A1 (en) 2002-10-10

Family

ID=23010780

Family Applications (3)

Application Number Title Priority Date Filing Date
US10/066,367 Active 2024-08-26 US7340776B2 (en) 2001-01-31 2002-01-31 Method and system for configuring and scheduling security audits of a computer network
US10/066,461 Abandoned US20020147803A1 (en) 2001-01-31 2002-01-31 Method and system for calculating risk in association with a security audit of a computer network
US11/821,194 Expired - Fee Related US7712138B2 (en) 2001-01-31 2007-06-21 Method and system for configuring and scheduling security audits of a computer network

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US10/066,367 Active 2024-08-26 US7340776B2 (en) 2001-01-31 2002-01-31 Method and system for configuring and scheduling security audits of a computer network

Family Applications After (1)

Application Number Title Priority Date Filing Date
US11/821,194 Expired - Fee Related US7712138B2 (en) 2001-01-31 2007-06-21 Method and system for configuring and scheduling security audits of a computer network

Country Status (3)

Country Link
US (3) US7340776B2 (en)
AU (2) AU2002244083A1 (en)
WO (2) WO2002061544A2 (en)

Cited By (121)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020194059A1 (en) * 2001-06-19 2002-12-19 International Business Machines Corporation Business process control point template and method
US20040015728A1 (en) * 2002-01-15 2004-01-22 Cole David M. System and method for network vulnerability detection and reporting
US20040221176A1 (en) * 2003-04-29 2004-11-04 Cole Eric B. Methodology, system and computer readable medium for rating computer system vulnerabilities
US20050010819A1 (en) * 2003-02-14 2005-01-13 Williams John Leslie System and method for generating machine auditable network policies
US20050086530A1 (en) * 2003-10-21 2005-04-21 International Business Machines Corp. System, method and program product to determine security risk of an application
US20050097339A1 (en) * 2003-11-05 2005-05-05 Wiley Kevin L. Method and system for addressing intrusion attacks on a computer system
US6895383B2 (en) 2001-03-29 2005-05-17 Accenture Sas Overall risk in a system
US20050160480A1 (en) * 2004-01-16 2005-07-21 International Business Machines Corporation Method, apparatus and program storage device for providing automated tracking of security vulnerabilities
US20050177746A1 (en) * 2003-12-22 2005-08-11 International Business Machines Corporation Method for providing network perimeter security assessment
US20050251860A1 (en) * 2004-05-04 2005-11-10 Kumar Saurabh Pattern discovery in a network security system
US20060021051A1 (en) * 2004-07-23 2006-01-26 D Mello Kurt Determining technology-appropriate remediation for vulnerability
US20060020814A1 (en) * 2004-07-20 2006-01-26 Reflectent Software, Inc. End user risk management
US20060018478A1 (en) * 2004-07-23 2006-01-26 Diefenderfer Kristopher G Secure communication protocol
US20060053134A1 (en) * 2004-09-03 2006-03-09 Durham Roderick H Centralized data transformation
US20060053475A1 (en) * 2004-09-03 2006-03-09 Bezilla Daniel B Policy-based selection of remediation
US20060053476A1 (en) * 2004-09-03 2006-03-09 Bezilla Daniel B Data structure for policy-based remediation selection
US20060053265A1 (en) * 2004-09-03 2006-03-09 Durham Roderick H Centralized data transformation
WO2006067121A1 (en) * 2004-12-20 2006-06-29 Siemens Aktiengesellschaft Method for providing a system with a secure design, associated system component and software
US20060191012A1 (en) * 2005-02-22 2006-08-24 Banzhof Carl E Security risk analysis system and method
US20060212932A1 (en) * 2005-01-10 2006-09-21 Robert Patrick System and method for coordinating network incident response activities
US20070006315A1 (en) * 2005-07-01 2007-01-04 Firas Bushnaq Network asset security risk surface assessment apparatus and method
US7167983B1 (en) 2002-03-08 2007-01-23 Lucent Technologies Inc. System and method for security project management
US20070260931A1 (en) * 2006-04-05 2007-11-08 Hector Aguilar-Macias Merging multi-line log entries
US7299504B1 (en) 2002-03-08 2007-11-20 Lucent Technologies Inc. System and method for implementing security management using a database-modeled security policy
US7305709B1 (en) * 2002-12-13 2007-12-04 Mcafee, Inc. System, method, and computer program product for conveying a status of a plurality of security applications
US20070283007A1 (en) * 2002-01-15 2007-12-06 Keir Robin M System And Method For Network Vulnerability Detection And Reporting
US7333999B1 (en) 2003-10-30 2008-02-19 Arcsight, Inc. Expression editor
US7376969B1 (en) 2002-12-02 2008-05-20 Arcsight, Inc. Real time monitoring and analysis of events from multiple network security devices
US20080201780A1 (en) * 2007-02-20 2008-08-21 Microsoft Corporation Risk-Based Vulnerability Assessment, Remediation and Network Access Protection
US7424742B1 (en) 2004-10-27 2008-09-09 Arcsight, Inc. Dynamic security events and event channels in a network security system
US20080229420A1 (en) * 2007-03-16 2008-09-18 Jeschke Konikaye Predictive Assessment of Network Risks
US20080282320A1 (en) * 2007-05-11 2008-11-13 Denovo Andrew Security Compliance Methodology and Tool
US20090024663A1 (en) * 2007-07-19 2009-01-22 Mcgovern Mark D Techniques for Information Security Assessment
US7519954B1 (en) 2004-04-08 2009-04-14 Mcafee, Inc. System and method of operating system identification
US7565696B1 (en) 2003-12-10 2009-07-21 Arcsight, Inc. Synchronizing network security devices within a network security system
US7607169B1 (en) 2002-12-02 2009-10-20 Arcsight, Inc. User interface for network security console
US7644438B1 (en) 2004-10-27 2010-01-05 Arcsight, Inc. Security event aggregation at software agent
US7647632B1 (en) 2005-01-04 2010-01-12 Arcsight, Inc. Object reference in a system
US7650638B1 (en) 2002-12-02 2010-01-19 Arcsight, Inc. Network security monitoring system employing bi-directional communication
US20100057519A1 (en) * 2008-08-27 2010-03-04 Chitra Dorai System and method for assigning service requests with due date dependent penalties
US20100125912A1 (en) * 2008-11-19 2010-05-20 Microsoft Corporation Estimating and visualizing security risk in information technology systems
US7752125B1 (en) * 2006-05-24 2010-07-06 Pravin Kothari Automated enterprise risk assessment
US20100192228A1 (en) * 2009-01-28 2010-07-29 Hewlett-Packard Development Company, L.P. Device, method and program product for prioritizing security flaw mitigation tasks in a business service
US20100199353A1 (en) * 2004-07-23 2010-08-05 Fortinet, Inc. Vulnerability-based remediation selection
US7788722B1 (en) 2002-12-02 2010-08-31 Arcsight, Inc. Modular agent for network security intrusion detection system
US7809131B1 (en) 2004-12-23 2010-10-05 Arcsight, Inc. Adjusting sensor time in a network security system
US7840896B2 (en) 2006-03-30 2010-11-23 Microsoft Corporation Definition and instantiation of metric based business logic reports
US7844999B1 (en) 2005-03-01 2010-11-30 Arcsight, Inc. Message parsing in a network security system
US7861299B1 (en) 2003-09-03 2010-12-28 Arcsight, Inc. Threat detection in a network security system
US7890869B1 (en) 2006-06-12 2011-02-15 Redseal Systems, Inc. Network security visualization methods, apparatus and graphical user interfaces
US7899901B1 (en) 2002-12-02 2011-03-01 Arcsight, Inc. Method and apparatus for exercising and debugging correlations for network security system
US20110125548A1 (en) * 2009-11-25 2011-05-26 Michal Aharon Business services risk management
US8015604B1 (en) 2003-10-10 2011-09-06 Arcsight Inc Hierarchical architecture in a network security system
US20110246504A1 (en) * 2010-04-01 2011-10-06 Salesforce.Com, Inc. System, method and computer program product for performing one or more actions based on a comparison of data associated with a client to one or more criteria
US20110302657A1 (en) * 2008-12-24 2011-12-08 Michiyo Ikegami Security countermeasure function evaluation program
US8122498B1 (en) 2002-12-12 2012-02-21 Mcafee, Inc. Combined multiple-application alert system and method
US8126750B2 (en) 2006-04-27 2012-02-28 Microsoft Corporation Consolidating data source queries for multidimensional scorecards
US8135830B2 (en) 2002-01-15 2012-03-13 Mcafee, Inc. System and method for network vulnerability detection and reporting
US8176527B1 (en) 2002-12-02 2012-05-08 Hewlett-Packard Development Company, L. P. Correlation engine with support for time-based rules
US8190992B2 (en) 2006-04-21 2012-05-29 Microsoft Corporation Grouping and display of logically defined reports
US8201257B1 (en) 2004-03-31 2012-06-12 Mcafee, Inc. System and method of managing network security risks
US8225407B1 (en) * 2003-08-21 2012-07-17 Symantec Corporation Incident prioritization and adaptive response recommendations
US8239941B1 (en) 2002-12-13 2012-08-07 Mcafee, Inc. Push alert system, method, and computer program product
US8261181B2 (en) 2006-03-30 2012-09-04 Microsoft Corporation Multidimensional metrics-based annotation
US8312535B1 (en) 2002-12-12 2012-11-13 Mcafee, Inc. System, method, and computer program product for interfacing a plurality of related applications
US8321805B2 (en) 2007-01-30 2012-11-27 Microsoft Corporation Service architecture based metric views
US8417996B2 (en) 2010-04-19 2013-04-09 International Business Machines Corporation Facade for business risk minimization in change administration via risk estimation and mistake identification by ticket analysis
US8495663B2 (en) 2007-02-02 2013-07-23 Microsoft Corporation Real time collaboration using embedded data visualizations
US8528077B1 (en) 2004-04-09 2013-09-03 Hewlett-Packard Development Company, L.P. Comparing events from multiple network security devices
US20130239177A1 (en) * 2012-03-07 2013-09-12 Derek SIGURDSON Controlling enterprise access by mobile devices
US20130276089A1 (en) * 2012-04-12 2013-10-17 Ariel Tseitlin Method and system for improving security and reliability in a networked application environment
US8613083B1 (en) 2002-12-02 2013-12-17 Hewlett-Packard Development Company, L.P. Method for batching events for transmission by software agent
US20140130170A1 (en) * 2012-11-06 2014-05-08 Institute For Information Industry Information security audit method, system and computer readable storage medium for storing thereof
US20140215630A1 (en) * 2013-01-31 2014-07-31 Hewlett-Packard Development Company, L.P. Performing an Automated Compliance Audit by Vulnerabilities
US20140325670A1 (en) * 2013-04-25 2014-10-30 Rivendale Software Solution Private Limited System and method for providing risk score based on sensitive information inside user device
US8966639B1 (en) 2014-02-14 2015-02-24 Risk I/O, Inc. Internet breach correlation
US8984643B1 (en) * 2014-02-14 2015-03-17 Risk I/O, Inc. Ordered computer vulnerability remediation reporting
US8984644B2 (en) 2003-07-01 2015-03-17 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9003537B2 (en) 2013-01-31 2015-04-07 Hewlett-Packard Development Company, L.P. CVSS information update by analyzing vulnerability information
US9027120B1 (en) 2003-10-10 2015-05-05 Hewlett-Packard Development Company, L.P. Hierarchical architecture in a network security system
US9058307B2 (en) 2007-01-26 2015-06-16 Microsoft Technology Licensing, Llc Presentation generation using scorecard elements
US9100422B1 (en) 2004-10-27 2015-08-04 Hewlett-Packard Development Company, L.P. Network zone identification in a network security system
US9100431B2 (en) 2003-07-01 2015-08-04 Securityprofiling, Llc Computer program product and apparatus for multi-path remediation
US9117069B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Real-time vulnerability monitoring
US9118708B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Multi-path remediation
US9118711B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9118710B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc System, method, and computer program product for reporting an occurrence in different manners
US9118709B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
CN105210078A (en) * 2013-03-26 2015-12-30 韩国电子通信研究院 Device for quantifying vulnerability of system and method therefor
WO2016016885A1 (en) * 2014-07-28 2016-02-04 B. G. Negev Technologies And Applications Ltd., At Ben-Gurion University Misuseability analysis for it infrastructure
US9350752B2 (en) 2003-07-01 2016-05-24 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9459987B2 (en) 2014-03-31 2016-10-04 Intuit Inc. Method and system for comparing different versions of a cloud based application in a production environment using segregated backend systems
US9473481B2 (en) 2014-07-31 2016-10-18 Intuit Inc. Method and system for providing a virtual asset perimeter
US9501345B1 (en) 2013-12-23 2016-11-22 Intuit Inc. Method and system for creating enriched log data
US9516064B2 (en) * 2013-10-14 2016-12-06 Intuit Inc. Method and system for dynamic and comprehensive vulnerability management
US20160359899A1 (en) * 2012-02-29 2016-12-08 Cytegic Ltd. System and method for cyber attacks analysis and decision support
US9596251B2 (en) 2014-04-07 2017-03-14 Intuit Inc. Method and system for providing security aware applications
US20170078322A1 (en) * 2014-12-29 2017-03-16 Palantir Technologies Inc. Systems for network risk assessment including processing of user access rights associated with a network of devices
US9686301B2 (en) 2014-02-03 2017-06-20 Intuit Inc. Method and system for virtual asset assisted extrusion and intrusion detection and threat scoring in a cloud computing environment
US9742794B2 (en) 2014-05-27 2017-08-22 Intuit Inc. Method and apparatus for automating threat model generation and pattern identification
US9866581B2 (en) 2014-06-30 2018-01-09 Intuit Inc. Method and system for secure delivery of information to computing environments
US9882925B2 (en) 2014-12-29 2018-01-30 Palantir Technologies Inc. Systems for network risk assessment including processing of user access rights associated with a network of devices
US9900322B2 (en) 2014-04-30 2018-02-20 Intuit Inc. Method and system for providing permissions management
US9923909B2 (en) 2014-02-03 2018-03-20 Intuit Inc. System and method for providing a self-monitoring, self-reporting, and self-repairing virtual asset configured for extrusion and intrusion detection and threat scoring in a cloud computing environment
RU2649290C1 (en) * 2017-04-28 2018-03-30 Акционерное общество "Лаборатория Касперского" SYSTEM AND METHOD OF TRAFFIC FILTRATION AT DDoS-ATTACK DETECTION
US20180241766A1 (en) * 2015-08-27 2018-08-23 Pcms Holdings, Inc. Trustworthy cloud-based smart space rating with distributed data collection
US10102082B2 (en) 2014-07-31 2018-10-16 Intuit Inc. Method and system for providing automated self-healing virtual assets
US10116681B2 (en) * 2016-12-21 2018-10-30 Denim Group, Ltd. Method of detecting shared vulnerable code
US10212184B2 (en) 2016-10-27 2019-02-19 Opaq Networks, Inc. Method for the continuous calculation of a cyber security risk index
US20190116193A1 (en) * 2017-10-17 2019-04-18 Yanlin Wang Risk assessment for network access control through data analytics
US10367842B2 (en) * 2015-04-16 2019-07-30 Nec Corporation Peer-based abnormal host detection for enterprise security systems
US10757133B2 (en) 2014-02-21 2020-08-25 Intuit Inc. Method and system for creating and deploying virtual assets
US20200314124A1 (en) * 2015-12-11 2020-10-01 Servicenow, Inc. Computer network threat assessment
US10990670B2 (en) * 2016-05-10 2021-04-27 Huawei Technologies Co., Ltd. Virtual network function audit method and apparatus
US11294700B2 (en) 2014-04-18 2022-04-05 Intuit Inc. Method and system for enabling self-monitoring virtual assets to correlate external events with characteristic patterns associated with the virtual assets
US20220191233A1 (en) * 2020-12-10 2022-06-16 KnowBe4, Inc. Systems and methods for improving assessment of security risk based on personal internet account data
US11379219B2 (en) 2018-11-19 2022-07-05 Security Compass Technologies Ltd. Automation of task identification in a software lifecycle
US20220342999A1 (en) * 2019-09-27 2022-10-27 Nec Corporation Security risk analysis assistance device, method, and computer-readable medium
US11503060B2 (en) * 2017-09-29 2022-11-15 Nec Corporation Information processing apparatus, information processing system, security assessment method, and security assessment program
EP4105862A3 (en) * 2021-08-17 2023-05-03 Beijing Baidu Netcom Science Technology Co., Ltd. Data processing method and apparatus, electronic device and storage medium
US11799917B2 (en) 2021-01-25 2023-10-24 Saudi Arabian Oil Company System, method, and computing medium to remediate cybersecurity risks based on a risk rating

Families Citing this family (262)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6773769B1 (en) * 1999-05-18 2004-08-10 3M Innovative Properties Company Macroporous ink receiving media
US7346929B1 (en) * 1999-07-29 2008-03-18 International Business Machines Corporation Method and apparatus for auditing network security
US7073198B1 (en) * 1999-08-26 2006-07-04 Ncircle Network Security, Inc. Method and system for detecting a vulnerability in a network
US6957348B1 (en) 2000-01-10 2005-10-18 Ncircle Network Security, Inc. Interoperability of vulnerability and intrusion detection systems
US7380270B2 (en) * 2000-08-09 2008-05-27 Telos Corporation Enhanced system, method and medium for certifying and accrediting requirements compliance
US6901346B2 (en) 2000-08-09 2005-05-31 Telos Corporation System, method and medium for certifying and accrediting requirements compliance
US6993448B2 (en) 2000-08-09 2006-01-31 Telos Corporation System, method and medium for certifying and accrediting requirements compliance
US7181769B1 (en) 2000-08-25 2007-02-20 Ncircle Network Security, Inc. Network security system having a device profiler communicatively coupled to a traffic monitor
US7664845B2 (en) * 2002-01-15 2010-02-16 Mcafee, Inc. System and method for network vulnerability detection and reporting
BR0215761A (en) * 2002-06-18 2006-11-28 Computer Ass Think Inc methods and systems for managing enterprise resources
US20030236995A1 (en) * 2002-06-21 2003-12-25 Fretwell Lyman Jefferson Method and apparatus for facilitating detection of network intrusion
US7526809B2 (en) * 2002-08-08 2009-04-28 Trend Micro Incorporated System and method for computer protection against malicious electronic mails by analyzing, profiling and trapping the same
US20040059920A1 (en) * 2002-09-19 2004-03-25 International Business Machines Corporation Security health checking tool
US20040064726A1 (en) * 2002-09-30 2004-04-01 Mario Girouard Vulnerability management and tracking system (VMTS)
US8359650B2 (en) * 2002-10-01 2013-01-22 Skybox Secutiry Inc. System, method and computer readable medium for evaluating potential attacks of worms
US8407798B1 (en) 2002-10-01 2013-03-26 Skybox Secutiry Inc. Method for simulation aided security event management
US6952779B1 (en) * 2002-10-01 2005-10-04 Gideon Cohen System and method for risk detection and analysis in a computer network
US8321235B2 (en) * 2002-11-27 2012-11-27 Hewlett-Packard Development Company, L.P. Validating an electronic transaction
US6983221B2 (en) 2002-11-27 2006-01-03 Telos Corporation Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing robust risk assessment model
US20040103309A1 (en) * 2002-11-27 2004-05-27 Tracy Richard P. Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing threat vulnerability feed
US6980927B2 (en) 2002-11-27 2005-12-27 Telos Corporation Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment
US7627891B2 (en) * 2003-02-14 2009-12-01 Preventsys, Inc. Network audit and policy assurance system
JP2004258777A (en) * 2003-02-24 2004-09-16 Fujitsu Ltd Security monitoring device, its system, its method and its program
US20040193918A1 (en) * 2003-03-28 2004-09-30 Kenneth Green Apparatus and method for network vulnerability detection and compliance assessment
US20060021028A1 (en) * 2003-03-28 2006-01-26 Brunette Glenn M System and method for adaptive policy and dependency-based system security audit
US8201256B2 (en) * 2003-03-28 2012-06-12 Trustwave Holdings, Inc. Methods and systems for assessing and advising on electronic compliance
US20040205419A1 (en) * 2003-04-10 2004-10-14 Trend Micro Incorporated Multilevel virus outbreak alert based on collaborative behavior
US8127359B2 (en) * 2003-04-11 2012-02-28 Samir Gurunath Kelekar Systems and methods for real-time network-based vulnerability assessment
US8266699B2 (en) 2003-07-01 2012-09-11 SecurityProfiling Inc. Multiple-path remediation
US20070192867A1 (en) * 2003-07-25 2007-08-16 Miliefsky Gary S Security appliances
US20040107363A1 (en) * 2003-08-22 2004-06-03 Emergency 24, Inc. System and method for anticipating the trustworthiness of an internet site
US8042187B2 (en) * 2003-08-25 2011-10-18 Hewlett-Packard Development Company, L.P. Security indication spanning tree system and method
WO2005029261A2 (en) * 2003-09-17 2005-03-31 Siemens Medical Solutions Health Services Corporation A processing device security management and configuration system and user interface
US7761527B2 (en) * 2004-02-10 2010-07-20 Emc Corporation Method and apparatus for discovering network based distributed applications
WO2005101789A1 (en) * 2004-04-14 2005-10-27 Gurunath Samir Kalekar A system for real-time network based vulnerability assessment of a host/device
US8353028B2 (en) * 2004-06-21 2013-01-08 Ebay Inc. Render engine, and method of using the same, to verify data for access and/or publication via a computer system
US7672003B2 (en) * 2004-09-01 2010-03-02 Eric Morgan Dowling Network scanner for global document creation, transmission and management
US7555778B2 (en) * 2004-10-19 2009-06-30 George Mason Intellectual Properties, Inc. Minimum-cost network hardening
US20060085852A1 (en) * 2004-10-20 2006-04-20 Caleb Sima Enterprise assessment management
US20060111927A1 (en) 2004-11-19 2006-05-25 International Business Machines Corporation System, method and program for estimating risk of disaster in infrastructure
US20060117385A1 (en) * 2004-11-30 2006-06-01 Mester Michael L Monitoring propagation protection within a network
US20060117387A1 (en) * 2004-11-30 2006-06-01 Gunsalus Bradley W Propagation protection of email within a network
US20080222532A1 (en) * 2004-11-30 2008-09-11 Mester Michael L Controlling and Monitoring Propagation Within a Network
US7478424B2 (en) * 2004-11-30 2009-01-13 Cymtec Systems, Inc. Propagation protection within a network
US20100195538A1 (en) * 2009-02-04 2010-08-05 Merkey Jeffrey V Method and apparatus for network packet capture distributed storage system
EP1832054B1 (en) * 2004-12-23 2018-03-21 Symantec Corporation Method and apparatus for network packet capture distributed storage system
US7979889B2 (en) * 2005-01-07 2011-07-12 Cisco Technology, Inc. Methods and apparatus providing security to computer systems and networks
US7627900B1 (en) * 2005-03-10 2009-12-01 George Mason Intellectual Properties, Inc. Attack graph aggregation
US20070061460A1 (en) * 2005-03-24 2007-03-15 Jumpnode Systems,Llc Remote access
US8572744B2 (en) * 2005-05-02 2013-10-29 Steelcloud, Inc. Information security auditing and incident investigation system
US8544098B2 (en) * 2005-09-22 2013-09-24 Alcatel Lucent Security vulnerability information aggregation
US8438643B2 (en) * 2005-09-22 2013-05-07 Alcatel Lucent Information system service-level security risk analysis
US8095984B2 (en) * 2005-09-22 2012-01-10 Alcatel Lucent Systems and methods of associating security vulnerabilities and assets
US9235703B2 (en) * 2005-09-30 2016-01-12 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. Virus scanning in a computer system
US7725737B2 (en) * 2005-10-14 2010-05-25 Check Point Software Technologies, Inc. System and methodology providing secure workspace environment
US20070101432A1 (en) * 2005-10-28 2007-05-03 Microsoft Corporation Risk driven compliance management
IL171963A0 (en) * 2005-11-14 2006-04-10 Nds Ltd Secure read-write storage device
EP1870845A3 (en) * 2006-06-19 2008-01-02 Casewise Limited A compliance facilitating system and method
GB2439354A (en) * 2006-06-19 2007-12-27 Casewise Ltd A system and method for facilitating compliance with a regulatory regime.
US8239915B1 (en) 2006-06-30 2012-08-07 Symantec Corporation Endpoint management using trust rating data
CN101513008B (en) * 2006-07-31 2012-09-19 意大利电信股份公司 System for implementing safety of telecommunication terminal
US7730293B2 (en) * 2006-10-26 2010-06-01 Hewlett-Packard Development Company, L.P. Hard disk drive self-test system and method
US20090199298A1 (en) * 2007-06-26 2009-08-06 Miliefsky Gary S Enterprise security management for network equipment
US9118706B2 (en) * 2007-06-29 2015-08-25 Verizon Patent And Licensing Inc. Using imported data from security tools
US20090030751A1 (en) * 2007-07-27 2009-01-29 Bank Of America Corporation Threat Modeling and Risk Forecasting Model
US8365276B1 (en) * 2007-12-10 2013-01-29 Mcafee, Inc. System, method and computer program product for sending unwanted activity information to a central system
US8086582B1 (en) * 2007-12-18 2011-12-27 Mcafee, Inc. System, method and computer program product for scanning and indexing data for different purposes
US8004998B2 (en) * 2008-05-23 2011-08-23 Solera Networks, Inc. Capture and regeneration of a network data using a virtual software switch
US8625642B2 (en) 2008-05-23 2014-01-07 Solera Networks, Inc. Method and apparatus of network artifact indentification and extraction
US20090292736A1 (en) * 2008-05-23 2009-11-26 Matthew Scott Wood On demand network activity reporting through a dynamic file system and method
US8521732B2 (en) 2008-05-23 2013-08-27 Solera Networks, Inc. Presentation of an extracted artifact based on an indexing technique
US20090328210A1 (en) * 2008-06-30 2009-12-31 Microsoft Corporation Chain of events tracking with data tainting for automated security feedback
US8261354B2 (en) 2008-09-17 2012-09-04 International Business Machines Corporation System, method and program product for dynamically performing an audit and security compliance validation in an operating environment
US8220056B2 (en) * 2008-09-23 2012-07-10 Savvis, Inc. Threat management system and method
US8726391B1 (en) * 2008-10-10 2014-05-13 Symantec Corporation Scheduling malware signature updates in relation to threat awareness and environmental safety
US9350755B1 (en) * 2009-03-20 2016-05-24 Symantec Corporation Method and apparatus for detecting malicious software transmission through a web portal
US20110125749A1 (en) * 2009-11-15 2011-05-26 Solera Networks, Inc. Method and Apparatus for Storing and Indexing High-Speed Network Traffic Data
WO2011060377A1 (en) * 2009-11-15 2011-05-19 Solera Networks, Inc. Method and apparatus for real time identification and recording of artifacts
US9077609B2 (en) * 2009-12-07 2015-07-07 Verizon Patent And Licensing Inc. Scalable reusable scanning of application networks/systems
JP2013523043A (en) 2010-03-22 2013-06-13 エルアールディシー システムズ、エルエルシー How to identify and protect the integrity of a source dataset
US20110246251A1 (en) * 2010-04-02 2011-10-06 Verizon Patent And Licensing Inc. Method and system for providing content-based investigation services
US8812342B2 (en) * 2010-06-15 2014-08-19 International Business Machines Corporation Managing and monitoring continuous improvement in detection of compliance violations
US8844042B2 (en) * 2010-06-16 2014-09-23 Microsoft Corporation System state based diagnostic scan
US9356941B1 (en) * 2010-08-16 2016-05-31 Symantec Corporation Systems and methods for detecting suspicious web pages
US8849991B2 (en) 2010-12-15 2014-09-30 Blue Coat Systems, Inc. System and method for hypertext transfer protocol layered reconstruction
US8666985B2 (en) 2011-03-16 2014-03-04 Solera Networks, Inc. Hardware accelerated application-based pattern matching for real time classification and recording of network traffic
US8181247B1 (en) * 2011-08-29 2012-05-15 Kaspersky Lab Zao System and method for protecting a computer system from the activity of malicious objects
US8832840B2 (en) * 2011-10-26 2014-09-09 Verizon Patent And Licensing Inc. Mobile application security and management service
US8800046B2 (en) * 2012-04-10 2014-08-05 Mcafee, Inc. Unified scan engine
US9516451B2 (en) * 2012-04-10 2016-12-06 Mcafee, Inc. Opportunistic system scanning
US9407653B2 (en) 2012-04-10 2016-08-02 Mcafee, Inc. Unified scan management
US8726393B2 (en) 2012-04-23 2014-05-13 Abb Technology Ag Cyber security analyzer
US9038178B1 (en) 2012-06-25 2015-05-19 Emc Corporation Detection of malware beaconing activities
US8949995B2 (en) * 2012-09-18 2015-02-03 International Business Machines Corporation Certifying server side web applications against security vulnerabilities
US9195826B1 (en) * 2013-05-30 2015-11-24 Emc Corporation Graph-based method to detect malware command-and-control infrastructure
US9729583B1 (en) * 2016-06-10 2017-08-08 OneTrust, LLC Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance
US9591022B2 (en) 2014-12-17 2017-03-07 The Boeing Company Computer defenses and counterattacks
US10756968B2 (en) * 2015-01-26 2020-08-25 Rapid7, Inc. Network resource management devices methods and systems
WO2017027029A1 (en) * 2015-08-12 2017-02-16 Hewlett Packard Enterprise Development Lp Training a security scan classifier to learn an issue preference of a human auditor
US20180239904A1 (en) * 2015-08-12 2018-08-23 Entit Software Llc Assigning classifiers to classify security scan issues
US9977905B2 (en) * 2015-10-06 2018-05-22 Assured Enterprises, Inc. Method and system for identification of security vulnerabilities
US10754647B2 (en) * 2015-12-21 2020-08-25 International Business Machines Corporation Dynamic scheduling for a scan
US11100046B2 (en) * 2016-01-25 2021-08-24 International Business Machines Corporation Intelligent security context aware elastic storage
US10169033B2 (en) * 2016-02-12 2019-01-01 International Business Machines Corporation Assigning a computer to a group of computers in a group infrastructure
US10706447B2 (en) * 2016-04-01 2020-07-07 OneTrust, LLC Data processing systems and communication systems and methods for the efficient generation of privacy risk assessments
US20220164840A1 (en) 2016-04-01 2022-05-26 OneTrust, LLC Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design
US11244367B2 (en) 2016-04-01 2022-02-08 OneTrust, LLC Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design
US11004125B2 (en) 2016-04-01 2021-05-11 OneTrust, LLC Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design
US11151233B2 (en) 2016-06-10 2021-10-19 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US10510031B2 (en) 2016-06-10 2019-12-17 OneTrust, LLC Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US10909488B2 (en) 2016-06-10 2021-02-02 OneTrust, LLC Data processing systems for assessing readiness for responding to privacy-related incidents
US10607028B2 (en) 2016-06-10 2020-03-31 OneTrust, LLC Data processing systems for data testing to confirm data deletion and related methods
US11146566B2 (en) 2016-06-10 2021-10-12 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10769301B2 (en) 2016-06-10 2020-09-08 OneTrust, LLC Data processing systems for webform crawling to map processing activities and related methods
US10949565B2 (en) 2016-06-10 2021-03-16 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11461500B2 (en) 2016-06-10 2022-10-04 OneTrust, LLC Data processing systems for cookie compliance testing with website scanning and related methods
US10708305B2 (en) 2016-06-10 2020-07-07 OneTrust, LLC Automated data processing systems and methods for automatically processing requests for privacy-related information
US11343284B2 (en) 2016-06-10 2022-05-24 OneTrust, LLC Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance
US11227247B2 (en) 2016-06-10 2022-01-18 OneTrust, LLC Data processing systems and methods for bundled privacy policies
US10896394B2 (en) 2016-06-10 2021-01-19 OneTrust, LLC Privacy management systems and methods
US10878127B2 (en) 2016-06-10 2020-12-29 OneTrust, LLC Data subject access request processing systems and related methods
US10706174B2 (en) 2016-06-10 2020-07-07 OneTrust, LLC Data processing systems for prioritizing data subject access requests for fulfillment and related methods
US10565397B1 (en) 2016-06-10 2020-02-18 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US11586700B2 (en) 2016-06-10 2023-02-21 OneTrust, LLC Data processing systems and methods for automatically blocking the use of tracking tools
US11138299B2 (en) 2016-06-10 2021-10-05 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11295316B2 (en) 2016-06-10 2022-04-05 OneTrust, LLC Data processing systems for identity validation for consumer rights requests and related methods
US10944725B2 (en) 2016-06-10 2021-03-09 OneTrust, LLC Data processing systems and methods for using a data model to select a target data asset in a data migration
US10909265B2 (en) 2016-06-10 2021-02-02 OneTrust, LLC Application privacy scanning systems and related methods
US10282700B2 (en) 2016-06-10 2019-05-07 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11416798B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing systems and methods for providing training in a vendor procurement process
US10839102B2 (en) 2016-06-10 2020-11-17 OneTrust, LLC Data processing systems for identifying and modifying processes that are subject to data subject access requests
US10740487B2 (en) 2016-06-10 2020-08-11 OneTrust, LLC Data processing systems and methods for populating and maintaining a centralized database of personal data
US10467432B2 (en) 2016-06-10 2019-11-05 OneTrust, LLC Data processing systems for use in automatically generating, populating, and submitting data subject access requests
US11157600B2 (en) 2016-06-10 2021-10-26 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11025675B2 (en) 2016-06-10 2021-06-01 OneTrust, LLC Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance
US10706131B2 (en) 2016-06-10 2020-07-07 OneTrust, LLC Data processing systems and methods for efficiently assessing the risk of privacy campaigns
US10706379B2 (en) 2016-06-10 2020-07-07 OneTrust, LLC Data processing systems for automatic preparation for remediation and related methods
US11057356B2 (en) 2016-06-10 2021-07-06 OneTrust, LLC Automated data processing systems and methods for automatically processing data subject access requests using a chatbot
US11134086B2 (en) 2016-06-10 2021-09-28 OneTrust, LLC Consent conversion optimization systems and related methods
US10726158B2 (en) 2016-06-10 2020-07-28 OneTrust, LLC Consent receipt management and automated process blocking systems and related methods
US10685140B2 (en) 2016-06-10 2020-06-16 OneTrust, LLC Consent receipt management systems and related methods
US10997318B2 (en) 2016-06-10 2021-05-04 OneTrust, LLC Data processing systems for generating and populating a data inventory for processing data access requests
US10798133B2 (en) 2016-06-10 2020-10-06 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11520928B2 (en) 2016-06-10 2022-12-06 OneTrust, LLC Data processing systems for generating personal data receipts and related methods
US11675929B2 (en) 2016-06-10 2023-06-13 OneTrust, LLC Data processing consent sharing systems and related methods
US10606916B2 (en) 2016-06-10 2020-03-31 OneTrust, LLC Data processing user interface monitoring systems and related methods
US10885485B2 (en) 2016-06-10 2021-01-05 OneTrust, LLC Privacy management systems and methods
US11416109B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Automated data processing systems and methods for automatically processing data subject access requests using a chatbot
US11277448B2 (en) 2016-06-10 2022-03-15 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11636171B2 (en) 2016-06-10 2023-04-25 OneTrust, LLC Data processing user interface monitoring systems and related methods
US11366909B2 (en) 2016-06-10 2022-06-21 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11074367B2 (en) 2016-06-10 2021-07-27 OneTrust, LLC Data processing systems for identity validation for consumer rights requests and related methods
US10678945B2 (en) 2016-06-10 2020-06-09 OneTrust, LLC Consent receipt management systems and related methods
US10873606B2 (en) 2016-06-10 2020-12-22 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11222309B2 (en) 2016-06-10 2022-01-11 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11544667B2 (en) 2016-06-10 2023-01-03 OneTrust, LLC Data processing systems for generating and populating a data inventory
US10846433B2 (en) 2016-06-10 2020-11-24 OneTrust, LLC Data processing consent management systems and related methods
US11354434B2 (en) 2016-06-10 2022-06-07 OneTrust, LLC Data processing systems for verification of consent and notice processing and related methods
US11651106B2 (en) 2016-06-10 2023-05-16 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US11625502B2 (en) 2016-06-10 2023-04-11 OneTrust, LLC Data processing systems for identifying and modifying processes that are subject to data subject access requests
US11210420B2 (en) 2016-06-10 2021-12-28 OneTrust, LLC Data subject access request processing systems and related methods
US10949170B2 (en) 2016-06-10 2021-03-16 OneTrust, LLC Data processing systems for integration of consumer feedback with data subject access requests and related methods
US11481710B2 (en) 2016-06-10 2022-10-25 OneTrust, LLC Privacy management systems and methods
US10318761B2 (en) 2016-06-10 2019-06-11 OneTrust, LLC Data processing systems and methods for auditing data request compliance
US10592692B2 (en) 2016-06-10 2020-03-17 OneTrust, LLC Data processing systems for central consent repository and related methods
US11144622B2 (en) 2016-06-10 2021-10-12 OneTrust, LLC Privacy management systems and methods
US11222142B2 (en) 2016-06-10 2022-01-11 OneTrust, LLC Data processing systems for validating authorization for personal data collection, storage, and processing
US10776518B2 (en) 2016-06-10 2020-09-15 OneTrust, LLC Consent receipt management systems and related methods
US11438386B2 (en) 2016-06-10 2022-09-06 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11651104B2 (en) 2016-06-10 2023-05-16 OneTrust, LLC Consent receipt management systems and related methods
US10572686B2 (en) 2016-06-10 2020-02-25 OneTrust, LLC Consent receipt management systems and related methods
US11023842B2 (en) 2016-06-10 2021-06-01 OneTrust, LLC Data processing systems and methods for bundled privacy policies
US11341447B2 (en) 2016-06-10 2022-05-24 OneTrust, LLC Privacy management systems and methods
US10282559B2 (en) 2016-06-10 2019-05-07 OneTrust, LLC Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US11336697B2 (en) 2016-06-10 2022-05-17 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US10848523B2 (en) 2016-06-10 2020-11-24 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11562097B2 (en) 2016-06-10 2023-01-24 OneTrust, LLC Data processing systems for central consent repository and related methods
US10783256B2 (en) 2016-06-10 2020-09-22 OneTrust, LLC Data processing systems for data transfer risk identification and related methods
US10776517B2 (en) 2016-06-10 2020-09-15 OneTrust, LLC Data processing systems for calculating and communicating cost of fulfilling data subject access requests and related methods
US11354435B2 (en) 2016-06-10 2022-06-07 OneTrust, LLC Data processing systems for data testing to confirm data deletion and related methods
US10706176B2 (en) 2016-06-10 2020-07-07 OneTrust, LLC Data-processing consent refresh, re-prompt, and recapture systems and related methods
US11294939B2 (en) 2016-06-10 2022-04-05 OneTrust, LLC Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software
US10803200B2 (en) 2016-06-10 2020-10-13 OneTrust, LLC Data processing systems for processing and managing data subject access in a distributed environment
US11188862B2 (en) 2016-06-10 2021-11-30 OneTrust, LLC Privacy management systems and methods
US10496846B1 (en) 2016-06-10 2019-12-03 OneTrust, LLC Data processing and communications systems and methods for the efficient implementation of privacy by design
US10169609B1 (en) 2016-06-10 2019-01-01 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US11138242B2 (en) 2016-06-10 2021-10-05 OneTrust, LLC Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software
US11416590B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11328092B2 (en) 2016-06-10 2022-05-10 OneTrust, LLC Data processing systems for processing and managing data subject access in a distributed environment
US10565161B2 (en) 2016-06-10 2020-02-18 OneTrust, LLC Data processing systems for processing data subject access requests
US10592648B2 (en) 2016-06-10 2020-03-17 OneTrust, LLC Consent receipt management systems and related methods
US11238390B2 (en) 2016-06-10 2022-02-01 OneTrust, LLC Privacy management systems and methods
US11200341B2 (en) 2016-06-10 2021-12-14 OneTrust, LLC Consent receipt management systems and related methods
US10853501B2 (en) 2016-06-10 2020-12-01 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US10997315B2 (en) 2016-06-10 2021-05-04 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10416966B2 (en) 2016-06-10 2019-09-17 OneTrust, LLC Data processing systems for identity validation of data subject access requests and related methods
US10585968B2 (en) 2016-06-10 2020-03-10 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US11100444B2 (en) 2016-06-10 2021-08-24 OneTrust, LLC Data processing systems and methods for providing training in a vendor procurement process
US11222139B2 (en) 2016-06-10 2022-01-11 OneTrust, LLC Data processing systems and methods for automatic discovery and assessment of mobile software development kits
US11301796B2 (en) 2016-06-10 2022-04-12 OneTrust, LLC Data processing systems and methods for customizing privacy training
US11087260B2 (en) 2016-06-10 2021-08-10 OneTrust, LLC Data processing systems and methods for customizing privacy training
US11416589B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US10796260B2 (en) 2016-06-10 2020-10-06 OneTrust, LLC Privacy management systems and methods
US11366786B2 (en) 2016-06-10 2022-06-21 OneTrust, LLC Data processing systems for processing data subject access requests
US10242228B2 (en) 2016-06-10 2019-03-26 OneTrust, LLC Data processing systems for measuring privacy maturity within an organization
US10762236B2 (en) 2016-06-10 2020-09-01 OneTrust, LLC Data processing user interface monitoring systems and related methods
US11392720B2 (en) 2016-06-10 2022-07-19 OneTrust, LLC Data processing systems for verification of consent and notice processing and related methods
US10713387B2 (en) 2016-06-10 2020-07-14 OneTrust, LLC Consent conversion optimization systems and related methods
US10565236B1 (en) 2016-06-10 2020-02-18 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11727141B2 (en) 2016-06-10 2023-08-15 OneTrust, LLC Data processing systems and methods for synching privacy-related user consent across multiple computing devices
US10776514B2 (en) 2016-06-10 2020-09-15 OneTrust, LLC Data processing systems for the identification and deletion of personal data in computer systems
US10503926B2 (en) 2016-06-10 2019-12-10 OneTrust, LLC Consent receipt management systems and related methods
US11038925B2 (en) 2016-06-10 2021-06-15 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11228620B2 (en) 2016-06-10 2022-01-18 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11188615B2 (en) 2016-06-10 2021-11-30 OneTrust, LLC Data processing consent capture systems and related methods
US11418492B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing systems and methods for using a data model to select a target data asset in a data migration
US11475136B2 (en) 2016-06-10 2022-10-18 OneTrust, LLC Data processing systems for data transfer risk identification and related methods
US11403377B2 (en) 2016-06-10 2022-08-02 OneTrust, LLC Privacy management systems and methods
US10284604B2 (en) 2016-06-10 2019-05-07 OneTrust, LLC Data processing and scanning systems for generating and populating a data inventory
US10282699B2 (en) * 2016-06-14 2019-05-07 International Business Machines Corporation Self-organizing software scan scheduling based on neural network cognitive classification
US11010717B2 (en) 2016-06-21 2021-05-18 The Prudential Insurance Company Of America Tool for improving network security
US10755347B2 (en) * 2016-09-21 2020-08-25 Coinbase, Inc. Corrective action realignment and feedback system for a compliance determination and enforcement platform
US11625769B2 (en) 2016-09-21 2023-04-11 Coinbase, Inc. Multi-factor integrated compliance determination and enforcement platform
US10235528B2 (en) * 2016-11-09 2019-03-19 International Business Machines Corporation Automated determination of vulnerability importance
US10360380B2 (en) * 2017-01-19 2019-07-23 Cylance Inc. Advanced malware classification
US11632382B2 (en) 2017-05-15 2023-04-18 Forcepoint Llc Anomaly detection using endpoint counters
US10999296B2 (en) 2017-05-15 2021-05-04 Forcepoint, LLC Generating adaptive trust profiles using information derived from similarly situated organizations
US10013577B1 (en) 2017-06-16 2018-07-03 OneTrust, LLC Data processing systems for identifying whether cookies contain personally identifying information
US10318729B2 (en) 2017-07-26 2019-06-11 Forcepoint, LLC Privacy protection during insider threat monitoring
US10999324B2 (en) 2017-08-01 2021-05-04 Forcepoint, LLC Direct-connect web endpoint
US10706155B1 (en) * 2017-09-28 2020-07-07 Amazon Technologies, Inc. Provision and execution of customized security assessments of resources in a computing environment
US10643002B1 (en) 2017-09-28 2020-05-05 Amazon Technologies, Inc. Provision and execution of customized security assessments of resources in a virtual computing environment
US10033756B1 (en) * 2017-10-26 2018-07-24 Hytrust, Inc. Methods and systems for holistically attesting the trust of heterogeneous compute resources
WO2019160427A1 (en) * 2018-02-13 2019-08-22 Craig Rowland Computer investigation method and system
WO2019217198A1 (en) 2018-05-07 2019-11-14 Walmart Apollo, Llc Systems and methods for managing network vulnerability scanning to avoid disruption of operations
US11544409B2 (en) 2018-09-07 2023-01-03 OneTrust, LLC Data processing systems and methods for automatically protecting sensitive data within privacy management systems
US11144675B2 (en) 2018-09-07 2021-10-12 OneTrust, LLC Data processing systems and methods for automatically protecting sensitive data within privacy management systems
US10803202B2 (en) 2018-09-07 2020-10-13 OneTrust, LLC Data processing systems for orphaned data identification and deletion and related methods
US10885186B2 (en) 2018-11-13 2021-01-05 Forcepoint, LLC System and method for operating a protected endpoint device
US11281806B2 (en) * 2018-12-03 2022-03-22 Accenture Global Solutions Limited Generating attack graphs in agile security platforms
US11184385B2 (en) 2018-12-03 2021-11-23 Accenture Global Solutions Limited Generating attack graphs in agile security platforms
US11546354B2 (en) * 2019-11-26 2023-01-03 Kyndryl, Inc. Network shutdown for cyber security
WO2021243508A1 (en) * 2020-06-01 2021-12-09 Paypal, Inc. Scanning for information according to scan objectives
WO2022011142A1 (en) 2020-07-08 2022-01-13 OneTrust, LLC Systems and methods for targeted data discovery
EP4189569A1 (en) 2020-07-28 2023-06-07 OneTrust LLC Systems and methods for automatically blocking the use of tracking tools
WO2022032072A1 (en) 2020-08-06 2022-02-10 OneTrust, LLC Data processing systems and methods for automatically redacting unstructured data from a data subject access request
JP2022047160A (en) * 2020-09-11 2022-03-24 富士フイルムビジネスイノベーション株式会社 Audit system and program
WO2022060860A1 (en) 2020-09-15 2022-03-24 OneTrust, LLC Data processing systems and methods for detecting tools for the automatic blocking of consent requests
US20230334158A1 (en) 2020-09-21 2023-10-19 OneTrust, LLC Data processing systems and methods for automatically detecting target data transfers and target data processing
WO2022099023A1 (en) 2020-11-06 2022-05-12 OneTrust, LLC Systems and methods for identifying data processing activities based on data discovery results
WO2022159901A1 (en) 2021-01-25 2022-07-28 OneTrust, LLC Systems and methods for discovery, classification, and indexing of data in a native computing system
US11803646B2 (en) 2021-01-30 2023-10-31 Hewlett Packard Enterprise Development Lp Vulnerability scanning
US11442906B2 (en) 2021-02-04 2022-09-13 OneTrust, LLC Managing custom attributes for domain objects defined within microservices
US11494515B2 (en) 2021-02-08 2022-11-08 OneTrust, LLC Data processing systems and methods for anonymizing data samples in classification analysis
WO2022173912A1 (en) 2021-02-10 2022-08-18 OneTrust, LLC Systems and methods for mitigating risks of third-party computing system functionality integration into a first-party computing system
US11775348B2 (en) 2021-02-17 2023-10-03 OneTrust, LLC Managing custom workflows for domain objects defined within microservices
US11546661B2 (en) 2021-02-18 2023-01-03 OneTrust, LLC Selective redaction of media content
WO2022192269A1 (en) 2021-03-08 2022-09-15 OneTrust, LLC Data transfer discovery and analysis systems and related methods
US11838275B2 (en) 2021-03-12 2023-12-05 Forcepoint Llc Web endpoint device having automatic switching between proxied and non-proxied communication modes
US11562078B2 (en) 2021-04-16 2023-01-24 OneTrust, LLC Assessing and managing computational risk involved with integrating third party computing functionality within a computing system
US20220337618A1 (en) * 2021-04-20 2022-10-20 EMC IP Holding Company LLC Kubernetes security isolation based on classified information and risk levels
US11620142B1 (en) 2022-06-03 2023-04-04 OneTrust, LLC Generating and customizing user interfaces for demonstrating functions of interactive user environments

Citations (93)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4672609A (en) * 1982-01-19 1987-06-09 Tandem Computers Incorporated Memory system with operation error detection
US4819234A (en) * 1987-05-01 1989-04-04 Prime Computer, Inc. Operating system debugger
US5121345A (en) * 1988-11-03 1992-06-09 Lentz Stephen A System and method for protecting integrity of computer data and software
US5204966A (en) * 1990-03-09 1993-04-20 Digital Equipment Corporation System for controlling access to a secure system by verifying acceptability of proposed password by using hashing and group of unacceptable passwords
US5210704A (en) * 1990-10-02 1993-05-11 Technology International Incorporated System for prognosis and diagnostics of failure and wearout monitoring and for prediction of life expectancy of helicopter gearboxes and other rotating equipment
US5278901A (en) * 1992-04-30 1994-01-11 International Business Machines Corporation Pattern-oriented intrusion-detection system and method
US5309562A (en) * 1991-08-19 1994-05-03 Multi-Tech Systems, Inc. Method and apparatus for establishing protocol spoofing from a modem
US5311593A (en) * 1992-05-13 1994-05-10 Chipcom Corporation Security system for a network concentrator
US5398196A (en) * 1993-07-29 1995-03-14 Chambers; David A. Method and apparatus for detection of computer viruses
US5414833A (en) * 1993-10-27 1995-05-09 International Business Machines Corporation Network security system and method using a parallel finite state machine adaptive active monitor and responder
US5511184A (en) * 1991-04-22 1996-04-23 Acer Incorporated Method and apparatus for protecting a computer system from computer viruses
US5515508A (en) * 1993-12-17 1996-05-07 Taligent, Inc. Client server system and method of operation including a dynamically configurable protocol stack
US5522026A (en) * 1994-03-18 1996-05-28 The Boeing Company System for creating a single electronic checklist in response to multiple faults
US5606668A (en) * 1993-12-15 1997-02-25 Checkpoint Software Technologies Ltd. System for securing inbound and outbound data packet flow in a computer network
US5623601A (en) * 1994-11-18 1997-04-22 Milkway Networks Corporation Apparatus and method for providing a secure gateway for communication and data exchanges between networks
US5623600A (en) * 1995-09-26 1997-04-22 Trend Micro, Incorporated Virus detection and removal apparatus for computer networks
US5630061A (en) * 1993-04-19 1997-05-13 International Business Machines Corporation System for enabling first computer to communicate over switched network with second computer located within LAN by using media access control driver in different modes
US5706210A (en) * 1995-03-01 1998-01-06 Fujitsu Limited Network monitoring device
US5715395A (en) * 1994-09-12 1998-02-03 International Business Machines Corporation Method and apparatus for reducing network resource location traffic in a network
US5734697A (en) * 1995-04-28 1998-03-31 Mci Corporation Method and apparatus for improving telecommunications system performance
US5745692A (en) * 1995-10-23 1998-04-28 Ncr Corporation Automated systems administration of remote computer servers
US5748098A (en) * 1993-02-23 1998-05-05 British Telecommunications Public Limited Company Event correlation
US5761504A (en) * 1996-02-16 1998-06-02 Motorola, Inc. Method for updating a software code in a communication system
US5765030A (en) * 1996-07-19 1998-06-09 Symantec Corp Processor emulator module having a variable pre-fetch queue size for program execution
US5764887A (en) * 1995-12-11 1998-06-09 International Business Machines Corporation System and method for supporting distributed computing mechanisms in a local area network server environment
US5764890A (en) * 1994-12-13 1998-06-09 Microsoft Corporation Method and system for adding a secure network server to an existing computer network
US5857191A (en) * 1996-07-08 1999-01-05 Gradient Technologies, Inc. Web application server with secure common gateway interface
US5864803A (en) * 1995-04-24 1999-01-26 Ericsson Messaging Systems Inc. Signal processing and training by a neural network for phoneme recognition
US5864665A (en) * 1996-08-20 1999-01-26 International Business Machines Corporation Auditing login activity in a distributed computing environment
US5872978A (en) * 1995-12-21 1999-02-16 U.S. Philips Corporation Method and apparatus for improved translation of program data into machine code format
US5875296A (en) * 1997-01-28 1999-02-23 International Business Machines Corporation Distributed file system web server user authentication with cookies
US5878420A (en) * 1995-08-31 1999-03-02 Compuware Corporation Network monitoring and management system
US5881236A (en) * 1996-04-26 1999-03-09 Hewlett-Packard Company System for installation of software on a remote computer system over a network using checksums and password protection
US5884033A (en) * 1996-05-15 1999-03-16 Spyglass, Inc. Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering actions
US5892903A (en) * 1996-09-12 1999-04-06 Internet Security Systems, Inc. Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system
US5899999A (en) * 1996-10-16 1999-05-04 Microsoft Corporation Iterative convolution filter particularly suited for use in an image classification and retrieval system
US5905859A (en) * 1997-01-09 1999-05-18 International Business Machines Corporation Managed network device security method and apparatus
US5907834A (en) * 1994-05-13 1999-05-25 International Business Machines Corporation Method and apparatus for detecting a presence of a computer virus
US6014645A (en) * 1996-04-19 2000-01-11 Block Financial Corporation Real-time financial card application system
US6016553A (en) * 1997-09-05 2000-01-18 Wild File, Inc. Method, software and apparatus for saving, using and recovering data
US6021510A (en) * 1997-11-24 2000-02-01 Symantec Corporation Antivirus accelerator
US6026442A (en) * 1997-11-24 2000-02-15 Cabletron Systems, Inc. Method and apparatus for surveillance in communications networks
US6029256A (en) * 1997-12-31 2000-02-22 Network Associates, Inc. Method and system for allowing computer programs easy access to features of a virus scanning engine
US6035323A (en) * 1997-10-24 2000-03-07 Pictra, Inc. Methods and apparatuses for distributing a collection of digital media over a network with automatic generation of presentable media
US6035423A (en) * 1997-12-31 2000-03-07 Network Associates, Inc. Method and system for providing automated updating and upgrading of antivirus applications using a computer network
US6041347A (en) * 1997-10-24 2000-03-21 Unified Access Communications Computer system and computer-implemented process for simultaneous configuration and monitoring of a computer network
US6052709A (en) * 1997-12-23 2000-04-18 Bright Light Technologies, Inc. Apparatus and method for controlling delivery of unsolicited electronic mail
US6061795A (en) * 1995-07-31 2000-05-09 Pinnacle Technology Inc. Network desktop management security system and method
US6067410A (en) * 1996-02-09 2000-05-23 Symantec Corporation Emulation repair system
US6070244A (en) * 1997-11-10 2000-05-30 The Chase Manhattan Bank Computer network security management system
US6070190A (en) * 1998-05-11 2000-05-30 International Business Machines Corporation Client-based application availability and response monitoring and reporting for distributed computing environments
US6173413B1 (en) * 1998-05-12 2001-01-09 Sun Microsystems, Inc. Mechanism for maintaining constant permissions for multiple instances of a device within a cluster
US6185689B1 (en) * 1998-06-24 2001-02-06 Richard S. Carson & Assoc., Inc. Method for network self security assessment
US6195687B1 (en) * 1998-03-18 2001-02-27 Netschools Corporation Method and apparatus for master-slave control in a educational classroom communication network
US6199181B1 (en) * 1997-09-09 2001-03-06 Perfecto Technologies Ltd. Method and system for maintaining restricted operating environments for application programs or operating systems
US6205552B1 (en) * 1998-12-31 2001-03-20 Mci Worldcom, Inc. Method and apparatus for checking security vulnerability of networked devices
US6220768B1 (en) * 1996-06-28 2001-04-24 Sun Microsystems, Inc. Network asset survey tool for gathering data about node equipment
US6226372B1 (en) * 1998-12-11 2001-05-01 Securelogix Corporation Tightly integrated cooperative telecommunications firewall and scanner with distributed capabilities
US6230288B1 (en) * 1998-10-29 2001-05-08 Network Associates, Inc. Method of treating whitespace during virus detection
US6338141B1 (en) * 1998-09-30 2002-01-08 Cybersoft, Inc. Method and apparatus for computer virus detection, analysis, and removal in real time
US6347374B1 (en) * 1998-06-05 2002-02-12 Intrusion.Com, Inc. Event detection
US6353385B1 (en) * 2000-08-25 2002-03-05 Hyperon Incorporated Method and system for interfacing an intrusion detection system to a central alarm system
US6357008B1 (en) * 1997-09-23 2002-03-12 Symantec Corporation Dynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phases
US20020032793A1 (en) * 2000-09-08 2002-03-14 The Regents Of The University Of Michigan Method and system for reconstructing a path taken by undesirable network traffic through a computer network from a source of the traffic
US20020032880A1 (en) * 2000-09-07 2002-03-14 Poletto Massimiliano Antonio Monitoring network traffic denial of service attacks
US6374358B1 (en) * 1998-08-05 2002-04-16 Sun Microsystems, Inc. Adaptive countermeasure selection method and apparatus
US6377994B1 (en) * 1996-04-15 2002-04-23 International Business Machines Corporation Method and apparatus for controlling server access to a resource in a client/server system
US6397245B1 (en) * 1999-06-14 2002-05-28 Hewlett-Packard Company System and method for evaluating the operation of a computer over a computer network
US6397242B1 (en) * 1998-05-15 2002-05-28 Vmware, Inc. Virtualization system including a virtual machine monitor for a computer with a segmented architecture
US6396845B1 (en) * 1997-04-25 2002-05-28 Nec Corporation Hierarchically interconnected routers for exclusively polling low activity network nodes to reduce polling traffic
US6510523B1 (en) * 1999-02-22 2003-01-21 Sun Microsystems Inc. Method and system for providing limited access privileges with an untrusted terminal
US6519703B1 (en) * 2000-04-14 2003-02-11 James B. Joyce Methods and apparatus for heuristic firewall
US6519647B1 (en) * 1999-07-23 2003-02-11 Microsoft Corporation Methods and apparatus for synchronizing access control in a web server
US6517587B2 (en) * 1998-12-08 2003-02-11 Yodlee.Com, Inc. Networked architecture for enabling automated gathering of information from Web servers
US20030037136A1 (en) * 2001-06-27 2003-02-20 Labovitz Craig H. Method and system for monitoring control signal traffic over a computer network
US6530024B1 (en) * 1998-11-20 2003-03-04 Centrax Corporation Adaptive feedback security system and method
US6535227B1 (en) * 2000-02-08 2003-03-18 Harris Corporation System and method for assessing the security posture of a network and having a graphical user interface
US6546493B1 (en) * 2001-11-30 2003-04-08 Networks Associates Technology, Inc. System, method and computer program product for risk assessment scanning based on detected anomalous events
US20030088791A1 (en) * 1998-11-09 2003-05-08 Sri International, Inc., A California Corporation Network surveillance
US6563959B1 (en) * 1999-07-30 2003-05-13 Pixlogic Llc Perceptual similarity image retrieval method
US6681331B1 (en) * 1999-05-11 2004-01-20 Cylant, Inc. Dynamic software system intrusion detection
US6691232B1 (en) * 1999-08-05 2004-02-10 Sun Microsystems, Inc. Security architecture with environment sensitive credential sufficiency evaluation
US6711127B1 (en) * 1998-07-31 2004-03-23 General Dynamics Government Systems Corporation System for intrusion detection and vulnerability analysis in a telecommunications signaling network
US6718383B1 (en) * 2000-06-02 2004-04-06 Sun Microsystems, Inc. High availability networking with virtual IP address failover
US6721806B2 (en) * 2002-09-05 2004-04-13 International Business Machines Corporation Remote direct memory access enabled network interface controller switchover and switchback support
US6725378B1 (en) * 1998-04-15 2004-04-20 Purdue Research Foundation Network protection for denial of service attacks
US6725377B1 (en) * 1999-03-12 2004-04-20 Networks Associates Technology, Inc. Method and system for updating anti-intrusion software
US6738600B1 (en) * 2000-08-04 2004-05-18 Harris Corporation Ceramic microelectromechanical structure
US6839850B1 (en) * 1999-03-04 2005-01-04 Prc, Inc. Method and system for detecting intrusion into and misuse of a data processing system
US6851057B1 (en) * 1999-11-30 2005-02-01 Symantec Corporation Data driven detection of viruses
US6883101B1 (en) * 2000-02-08 2005-04-19 Harris Corporation System and method for assessing the security posture of a network using goal oriented fuzzy logic decision rules
US6886102B1 (en) * 1999-07-14 2005-04-26 Symantec Corporation System and method for protecting a computer network against denial of service attacks
US6889168B2 (en) * 1998-06-15 2005-05-03 Innerwall, Inc. Method and apparatus for assessing the security of a computer system

Family Cites Families (145)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4223380A (en) 1978-04-06 1980-09-16 Ncr Corporation Distributed multiprocessor communication system
JPS55112651A (en) 1979-02-21 1980-08-30 Fujitsu Ltd Virtual computer system
US4773028A (en) 1984-10-01 1988-09-20 Tektronix, Inc. Method and apparatus for improved monitoring and detection of improper device operation
CA1314101C (en) 1988-02-17 1993-03-02 Henry Shao-Lin Teng Expert system for security inspection of a digital computer system in a network environment
US4975950A (en) 1988-11-03 1990-12-04 Lentz Stephen A System and method of protecting integrity of computer data and software
US5347450A (en) 1989-01-18 1994-09-13 Intel Corporation Message routing in a multiprocessor computer system
US5353393A (en) 1989-06-14 1994-10-04 Sunwest Trading Corporation Apparatus and method for manipulating scanned documents in a computer aided design system
US5347579A (en) 1989-07-05 1994-09-13 Blandford Robert R Personal computer diary
EP0449242A3 (en) 1990-03-28 1992-10-28 National Semiconductor Corporation Method and structure for providing computer security and virus prevention
US5032979A (en) 1990-06-22 1991-07-16 International Business Machines Corporation Distributed security auditing subsystem for an operating system
JPH04310188A (en) 1991-03-01 1992-11-02 Internatl Business Mach Corp <Ibm> Library service method for document/image library
US5274824A (en) 1991-03-01 1993-12-28 Bull Hn Information Systems Inc. Keyring metaphor for user's security keys on a distributed multiprocess data system
US5774727A (en) 1991-06-27 1998-06-30 Digital Equipment Corporation Parallel processing system for virtual processor implementation of machine-language instructions
US5577209A (en) 1991-07-11 1996-11-19 Itt Corporation Apparatus and method for providing multi-level security for communication among computers and terminals on a network
US5454074A (en) 1991-09-18 1995-09-26 The Boeing Company Electronic checklist system
US5649095A (en) 1992-03-30 1997-07-15 Cozza; Paul D. Method and apparatus for detecting computer viruses through the use of a scan information cache
US5359659A (en) 1992-06-19 1994-10-25 Doren Rosenthal Method for securing software against corruption by computer viruses
US5371852A (en) 1992-10-14 1994-12-06 International Business Machines Corporation Method and apparatus for making a cluster of computers appear as a single host on a network
US5345595A (en) 1992-11-12 1994-09-06 Coral Systems, Inc. Apparatus and method for detecting fraudulent telecommunication activity
US5440723A (en) 1993-01-19 1995-08-08 International Business Machines Corporation Automatic immune system for computers and computer networks
JP2501771B2 (en) 1993-01-19 1996-05-29 インターナショナル・ビジネス・マシーンズ・コーポレイション Method and apparatus for obtaining multiple valid signatures of an unwanted software entity
US5586260A (en) 1993-02-12 1996-12-17 Digital Equipment Corporation Method and apparatus for authenticating a client to a server in computer systems which support different security mechanisms
GB9303527D0 (en) 1993-02-22 1993-04-07 Hewlett Packard Ltd Network analysis method
US5835726A (en) 1993-12-15 1998-11-10 Check Point Software Technologies Ltd. System for securing the flow of and selectively modifying packets in a computer network
US5974457A (en) 1993-12-23 1999-10-26 International Business Machines Corporation Intelligent realtime monitoring of data traffic
US5557742A (en) 1994-03-07 1996-09-17 Haystack Labs, Inc. Method and system for detecting intrusion into and misuse of a data processing system
JPH10501354A (en) 1994-06-01 1998-02-03 クワンタム・リープ・イノヴェーションズ・インコーポレーテッド Computer virus trap device
US5999711A (en) 1994-07-18 1999-12-07 Microsoft Corporation Method and system for providing certificates holding authentication and authorization information for users/machines
US6006016A (en) * 1994-11-10 1999-12-21 Bay Networks, Inc. Network fault correlation
CA2138302C (en) 1994-12-15 1999-05-25 Michael S. Fortinsky Provision of secure access to external resources from a distributed computing environment
US5590331A (en) 1994-12-23 1996-12-31 Sun Microsystems, Inc. Method and apparatus for generating platform-standard object files containing machine-independent code
US5696486A (en) 1995-03-29 1997-12-09 Cabletron Systems, Inc. Method and apparatus for policy-based alarm notification in a distributed network management environment
US5790799A (en) 1995-05-17 1998-08-04 Digital Equipment Corporation System for sampling network packets by only storing the network packet that its error check code matches with the reference error check code
US6477585B1 (en) 1995-08-18 2002-11-05 International Business Machines Corporation Filter mechanism for an event management service
US6144961A (en) 1995-08-31 2000-11-07 Compuware Corporation Method and system for non-intrusive measurement of transaction response times on a network
US5854916A (en) 1995-09-28 1998-12-29 Symantec Corporation State-based cache for antivirus software
US5826013A (en) 1995-09-28 1998-10-20 Symantec Corporation Polymorphic virus detection module
US5696822A (en) 1995-09-28 1997-12-09 Symantec Corporation Polymorphic virus detection module
US5832211A (en) 1995-11-13 1998-11-03 International Business Machines Corporation Propagating plain-text passwords from a main registry to a plurality of foreign registries
US5838903A (en) 1995-11-13 1998-11-17 International Business Machines Corporation Configurable password integrity servers for use in a shared resource environment
JP3165366B2 (en) 1996-02-08 2001-05-14 株式会社日立製作所 Network security system
JPH09214493A (en) * 1996-02-08 1997-08-15 Hitachi Ltd Network system
US5950012A (en) 1996-03-08 1999-09-07 Texas Instruments Incorporated Single chip microprocessor circuits, systems, and methods for self-loading patch micro-operation codes and patch microinstruction codes
US5964839A (en) 1996-03-29 1999-10-12 At&T Corp System and method for monitoring information flow and performing data collection
US5822517A (en) 1996-04-15 1998-10-13 Dotan; Eyal Method for detecting infection of software programs by memory resident software viruses
US6104783A (en) 1996-05-01 2000-08-15 Instant Alert Security, Llc Method and apparatus for securing a site utilizing a security apparatus in cooperation with telephone systems
US5798706A (en) 1996-06-18 1998-08-25 Raptor Systems, Inc. Detecting unauthorized network communication
US5787177A (en) 1996-08-01 1998-07-28 Harris Corporation Integrated network security access control system
US5828833A (en) 1996-08-15 1998-10-27 Electronic Data Systems Corporation Method and system for allowing remote procedure calls through a network firewall
US5832208A (en) 1996-09-05 1998-11-03 Cheyenne Software International Sales Corp. Anti-virus agent for use with databases and mail servers
US5845067A (en) 1996-09-09 1998-12-01 Porter; Jack Edward Method and apparatus for document management utilizing a messaging system
US5983350A (en) 1996-09-18 1999-11-09 Secure Computing Corporation Secure firewall supporting different levels of authentication based on address or encryption status
US6453345B2 (en) 1996-11-06 2002-09-17 Datadirect Networks, Inc. Network security and surveillance system
US6167520A (en) 1996-11-08 2000-12-26 Finjan Software, Inc. System and method for protecting a client during runtime from hostile downloadables
US6154844A (en) 1996-11-08 2000-11-28 Finjan Software, Ltd. System and method for attaching a downloadable security profile to a downloadable
US5991881A (en) 1996-11-08 1999-11-23 Harris Corporation Network surveillance system
US5796942A (en) 1996-11-21 1998-08-18 Computer Associates International, Inc. Method and apparatus for automated network-wide surveillance and security breach intervention
US5848233A (en) 1996-12-09 1998-12-08 Sun Microsystems, Inc. Method and apparatus for dynamic packet filter assignment
US5974237A (en) 1996-12-18 1999-10-26 Northern Telecom Limited Communications network monitoring
US5872915A (en) * 1996-12-23 1999-02-16 International Business Machines Corporation Computer apparatus and method for providing security checking for software applications accessed via the World-Wide Web
US5987611A (en) 1996-12-31 1999-11-16 Zone Labs, Inc. System and methodology for managing internet access on a per application basis for client computers connected to the internet
US6085224A (en) 1997-03-11 2000-07-04 Intracept, Inc. Method and system for responding to hidden data and programs in a datastream
US5983270A (en) 1997-03-11 1999-11-09 Sequel Technology Corporation Method and apparatus for managing internetwork and intranetwork activity
US5925126A (en) 1997-03-18 1999-07-20 Memco Software, Ltd. Method for security shield implementation in computer system's software
US5987606A (en) 1997-03-19 1999-11-16 Bascom Global Internet Services, Inc. Method and system for content filtering information retrieved from an internet computer network
US6477648B1 (en) 1997-03-23 2002-11-05 Novell, Inc. Trusted workstation in a networked client/server computing system
US5964889A (en) 1997-04-16 1999-10-12 Symantec Corporation Method to analyze a program for presence of computer viruses by examining the opcode for faults before emulating instruction in emulator
US6314525B1 (en) 1997-05-13 2001-11-06 3Com Corporation Means for allowing two or more network interface controller cards to appear as one card to an operating system
US5922051A (en) 1997-05-14 1999-07-13 Ncr Corporation System and method for traffic management in a network management system
US6119234A (en) 1997-06-27 2000-09-12 Sun Microsystems, Inc. Method and apparatus for client-host communication over a computer network
US6073172A (en) 1997-07-14 2000-06-06 Freegate Corporation Initializing and reconfiguring a secure network interface
KR19990011713A (en) 1997-07-25 1999-02-18 윤종용 Text information transmission by scenario type user interface
DE69823116D1 (en) 1997-08-05 2004-05-19 Canon Kk Image processing method and device
US5919257A (en) 1997-08-08 1999-07-06 Novell, Inc. Networked workstation intrusion detection system
US5978917A (en) 1997-08-14 1999-11-02 Symantec Corporation Detection and elimination of macro viruses
US6275938B1 (en) 1997-08-28 2001-08-14 Microsoft Corporation Security enhancement for untrusted executable code
US6009467A (en) 1997-08-29 1999-12-28 International Business Machines Corporation System for checking status of supported functions of communication platforms at preselected intervals in order to allow hosts to obtain updated list of all supported functions
US5983348A (en) 1997-09-10 1999-11-09 Trend Micro Incorporated Computer network malicious code scanner
US5961644A (en) 1997-09-19 1999-10-05 International Business Machines Corporation Method and apparatus for testing the integrity of computer security alarm systems
US5991856A (en) 1997-09-30 1999-11-23 Network Associates, Inc. System and method for computer operating system protection
US6081894A (en) 1997-10-22 2000-06-27 Rvt Technologies, Inc. Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data
US6003132A (en) 1997-10-22 1999-12-14 Rvt Technologies, Inc. Method and apparatus for isolating a computer system upon detection of viruses and similar data
WO1999022318A1 (en) 1997-10-27 1999-05-06 Massachusetts Institute Of Technology Image search and retrieval system
US6119165A (en) 1997-11-17 2000-09-12 Trend Micro, Inc. Controlled distribution of application programs in a computer network
US6108799A (en) 1997-11-21 2000-08-22 International Business Machines Corporation Automated sample creation of polymorphic and non-polymorphic marcro viruses
US6094731A (en) 1997-11-24 2000-07-25 Symantec Corporation Antivirus accelerator for computer networks
US6118940A (en) 1997-11-25 2000-09-12 International Business Machines Corp. Method and apparatus for benchmarking byte code sequences
IL122314A (en) 1997-11-27 2001-03-19 Security 7 Software Ltd Method and system for enforcing a communication security policy
US6088803A (en) 1997-12-30 2000-07-11 Intel Corporation System for virus-checking network data during download to a client device
US6088804A (en) * 1998-01-12 2000-07-11 Motorola, Inc. Adaptive system and method for responding to computer network security attacks
US6122738A (en) 1998-01-22 2000-09-19 Symantec Corporation Computer file integrity verification
US5987610A (en) 1998-02-12 1999-11-16 Ameritech Corporation Computer virus screening methods and systems
US6279113B1 (en) 1998-03-16 2001-08-21 Internet Tools, Inc. Dynamic signature inspection-based network intrusion detection
US6628824B1 (en) 1998-03-20 2003-09-30 Ken Belanger Method and apparatus for image identification and comparison
US6161109A (en) 1998-04-16 2000-12-12 International Business Machines Corporation Accumulating changes in a database management system by copying the data object to the image copy if the data object identifier of the data object is greater than the image identifier of the image copy
US6298445B1 (en) * 1998-04-30 2001-10-02 Netect, Ltd. Computer security
US6408391B1 (en) 1998-05-06 2002-06-18 Prc Inc. Dynamic system defense for information warfare
US6275942B1 (en) 1998-05-20 2001-08-14 Network Associates, Inc. System, method and computer program product for automatic response to computer system misuse using active response modules
CA2335600A1 (en) 1998-06-22 1999-12-29 Charles T. Gambetta Virtual data storage (vds) system
US6324656B1 (en) * 1998-06-30 2001-11-27 Cisco Technology, Inc. System and method for rules-driven multi-phase network vulnerability assessment
US6282546B1 (en) 1998-06-30 2001-08-28 Cisco Technology, Inc. System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment
US6661904B1 (en) 1998-07-15 2003-12-09 Personalogo Method and system for automated electronic conveyance of hidden data
US6453346B1 (en) 1998-07-17 2002-09-17 Proactivenet, Inc. Method and apparatus for intelligent storage and reduction of network information
US6429952B1 (en) 1998-08-31 2002-08-06 Sharp Laboratories Of America Browser interface to scanner
DE69817176T2 (en) 1998-09-09 2004-06-24 International Business Machines Corp. Method and device for intrusion detection in computers and computer networks
US6271840B1 (en) 1998-09-24 2001-08-07 James Lee Finseth Graphical search engine visual index
US6460141B1 (en) 1998-10-28 2002-10-01 Rsa Security Inc. Security and access management system for web-enabled and non-web-enabled applications and content on a computer network
US6266774B1 (en) 1998-12-08 2001-07-24 Mcafee.Com Corporation Method and system for securing, managing or optimizing a personal computer
US6370648B1 (en) * 1998-12-08 2002-04-09 Visa International Service Association Computer network intrusion detection
US6574737B1 (en) * 1998-12-23 2003-06-03 Symantec Corporation System for penetrating computer or computer network
US6415321B1 (en) 1998-12-29 2002-07-02 Cisco Technology, Inc. Domain mapping method and system
US6499107B1 (en) 1998-12-29 2002-12-24 Cisco Technology, Inc. Method and system for adaptive network security using intelligent packet analysis
US6301668B1 (en) * 1998-12-29 2001-10-09 Cisco Technology, Inc. Method and system for adaptive network security using network vulnerability assessment
US6266773B1 (en) 1998-12-31 2001-07-24 Intel. Corp. Computer security system
US6477651B1 (en) 1999-01-08 2002-11-05 Cisco Technology, Inc. Intrusion detection system and method having dynamically loaded signatures
US6487666B1 (en) 1999-01-15 2002-11-26 Cisco Technology, Inc. Intrusion detection signature analysis using regular expressions and logical operators
US6578147B1 (en) 1999-01-15 2003-06-10 Cisco Technology, Inc. Parallel intrusion detection sensors with load balancing for high speed networks
US6438600B1 (en) 1999-01-29 2002-08-20 International Business Machines Corporation Securely sharing log-in credentials among trusted browser-based applications
US6647139B1 (en) 1999-02-18 2003-11-11 Matsushita Electric Industrial Co., Ltd. Method of object recognition, apparatus of the same and recording medium therefor
US6405318B1 (en) 1999-03-12 2002-06-11 Psionic Software, Inc. Intrusion detection system
US6434615B1 (en) 1999-04-30 2002-08-13 Compaq Information Technologies Group, L.P. Method and apparatus for remote computer management using HTML in a web browser application and an internet server extension on an internet server API-compliant web server
US6493752B1 (en) 1999-05-06 2002-12-10 Watchguard Technologies Device and method for graphically displaying data movement in a secured network
JP2000322573A (en) 1999-05-06 2000-11-24 Canon Inc Method and device for image processing
US7096499B2 (en) 1999-05-11 2006-08-22 Cylant, Inc. Method and system for simplifying the structure of dynamic execution profiles
US6445822B1 (en) 1999-06-04 2002-09-03 Look Dynamics, Inc. Search method and apparatus for locating digitally stored content, such as visual images, music and sounds, text, or software, in storage devices on a computer network
US7346929B1 (en) * 1999-07-29 2008-03-18 International Business Machines Corporation Method and apparatus for auditing network security
US6647400B1 (en) 1999-08-30 2003-11-11 Symantec Corporation System and method for analyzing filesystems to detect intrusions
US6324647B1 (en) * 1999-08-31 2001-11-27 Michel K. Bowman-Amuah System, method and article of manufacture for security management in a development architecture framework
US6405364B1 (en) * 1999-08-31 2002-06-11 Accenture Llp Building techniques in a development architecture framework
US6912676B1 (en) * 1999-09-02 2005-06-28 International Business Machines Automated risk assessment tool for AIX-based computer systems
JP2001092972A (en) 1999-09-24 2001-04-06 Mamoru Minami Image recognizing method
US6467002B1 (en) * 1999-10-19 2002-10-15 3Com Corporation Single cycle modified round-robin arbitration with embedded priority
US6601190B1 (en) 1999-10-28 2003-07-29 Hewlett-Packard Development Company, L.P. Automatic capture and reporting of computer configuration data
US6606744B1 (en) 1999-11-22 2003-08-12 Accenture, Llp Providing collaborative installation management in a network-based supply chain environment
US6584454B1 (en) 1999-12-31 2003-06-24 Ge Medical Technology Services, Inc. Method and apparatus for community management in remote system servicing
US6871284B2 (en) * 2000-01-07 2005-03-22 Securify, Inc. Credential/condition assertion verification optimization
US6792144B1 (en) 2000-03-03 2004-09-14 Koninklijke Philips Electronics N.V. System and method for locating an object in an image using models
US6775780B1 (en) 2000-03-16 2004-08-10 Networks Associates Technology, Inc. Detecting malicious software by analyzing patterns of system calls generated during emulation
JP2003529254A (en) 2000-03-27 2003-09-30 ネットワーク セキュリティー システムズ, インコーポレーテッド Internet / network security method and system for checking customer security from a remote device
JP2002056176A (en) * 2000-06-01 2002-02-20 Asgent Inc Method and device for structuring security policy and method and device for supporting security policy structuring
US8341743B2 (en) 2000-07-14 2012-12-25 Ca, Inc. Detection of viral code using emulation of operating system functions
US20020083331A1 (en) 2000-12-21 2002-06-27 802 Systems, Inc. Methods and systems using PLD-based network communication protocols
US7290283B2 (en) 2001-01-31 2007-10-30 Lancope, Inc. Network port profiling
US7013395B1 (en) * 2001-03-13 2006-03-14 Sandra Corporation Method and tool for network vulnerability analysis
US6952779B1 (en) * 2002-10-01 2005-10-04 Gideon Cohen System and method for risk detection and analysis in a computer network

Patent Citations (99)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4672609A (en) * 1982-01-19 1987-06-09 Tandem Computers Incorporated Memory system with operation error detection
US4819234A (en) * 1987-05-01 1989-04-04 Prime Computer, Inc. Operating system debugger
US5121345A (en) * 1988-11-03 1992-06-09 Lentz Stephen A System and method for protecting integrity of computer data and software
US5204966A (en) * 1990-03-09 1993-04-20 Digital Equipment Corporation System for controlling access to a secure system by verifying acceptability of proposed password by using hashing and group of unacceptable passwords
US5210704A (en) * 1990-10-02 1993-05-11 Technology International Incorporated System for prognosis and diagnostics of failure and wearout monitoring and for prediction of life expectancy of helicopter gearboxes and other rotating equipment
US5511184A (en) * 1991-04-22 1996-04-23 Acer Incorporated Method and apparatus for protecting a computer system from computer viruses
US5309562A (en) * 1991-08-19 1994-05-03 Multi-Tech Systems, Inc. Method and apparatus for establishing protocol spoofing from a modem
US5278901A (en) * 1992-04-30 1994-01-11 International Business Machines Corporation Pattern-oriented intrusion-detection system and method
US5311593A (en) * 1992-05-13 1994-05-10 Chipcom Corporation Security system for a network concentrator
US5748098A (en) * 1993-02-23 1998-05-05 British Telecommunications Public Limited Company Event correlation
US5630061A (en) * 1993-04-19 1997-05-13 International Business Machines Corporation System for enabling first computer to communicate over switched network with second computer located within LAN by using media access control driver in different modes
US5398196A (en) * 1993-07-29 1995-03-14 Chambers; David A. Method and apparatus for detection of computer viruses
US5414833A (en) * 1993-10-27 1995-05-09 International Business Machines Corporation Network security system and method using a parallel finite state machine adaptive active monitor and responder
US5606668A (en) * 1993-12-15 1997-02-25 Checkpoint Software Technologies Ltd. System for securing inbound and outbound data packet flow in a computer network
US5515508A (en) * 1993-12-17 1996-05-07 Taligent, Inc. Client server system and method of operation including a dynamically configurable protocol stack
US5522026A (en) * 1994-03-18 1996-05-28 The Boeing Company System for creating a single electronic checklist in response to multiple faults
US5907834A (en) * 1994-05-13 1999-05-25 International Business Machines Corporation Method and apparatus for detecting a presence of a computer virus
US5715395A (en) * 1994-09-12 1998-02-03 International Business Machines Corporation Method and apparatus for reducing network resource location traffic in a network
US5623601A (en) * 1994-11-18 1997-04-22 Milkway Networks Corporation Apparatus and method for providing a secure gateway for communication and data exchanges between networks
US5764890A (en) * 1994-12-13 1998-06-09 Microsoft Corporation Method and system for adding a secure network server to an existing computer network
US5706210A (en) * 1995-03-01 1998-01-06 Fujitsu Limited Network monitoring device
US5864803A (en) * 1995-04-24 1999-01-26 Ericsson Messaging Systems Inc. Signal processing and training by a neural network for phoneme recognition
US5734697A (en) * 1995-04-28 1998-03-31 Mci Corporation Method and apparatus for improving telecommunications system performance
US6061795A (en) * 1995-07-31 2000-05-09 Pinnacle Technology Inc. Network desktop management security system and method
US5878420A (en) * 1995-08-31 1999-03-02 Compuware Corporation Network monitoring and management system
US5623600A (en) * 1995-09-26 1997-04-22 Trend Micro, Incorporated Virus detection and removal apparatus for computer networks
US5745692A (en) * 1995-10-23 1998-04-28 Ncr Corporation Automated systems administration of remote computer servers
US5764887A (en) * 1995-12-11 1998-06-09 International Business Machines Corporation System and method for supporting distributed computing mechanisms in a local area network server environment
US5872978A (en) * 1995-12-21 1999-02-16 U.S. Philips Corporation Method and apparatus for improved translation of program data into machine code format
US6067410A (en) * 1996-02-09 2000-05-23 Symantec Corporation Emulation repair system
US5761504A (en) * 1996-02-16 1998-06-02 Motorola, Inc. Method for updating a software code in a communication system
US6377994B1 (en) * 1996-04-15 2002-04-23 International Business Machines Corporation Method and apparatus for controlling server access to a resource in a client/server system
US6014645A (en) * 1996-04-19 2000-01-11 Block Financial Corporation Real-time financial card application system
US5881236A (en) * 1996-04-26 1999-03-09 Hewlett-Packard Company System for installation of software on a remote computer system over a network using checksums and password protection
US5884033A (en) * 1996-05-15 1999-03-16 Spyglass, Inc. Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering actions
US6220768B1 (en) * 1996-06-28 2001-04-24 Sun Microsystems, Inc. Network asset survey tool for gathering data about node equipment
US5857191A (en) * 1996-07-08 1999-01-05 Gradient Technologies, Inc. Web application server with secure common gateway interface
US5765030A (en) * 1996-07-19 1998-06-09 Symantec Corp Processor emulator module having a variable pre-fetch queue size for program execution
US5864665A (en) * 1996-08-20 1999-01-26 International Business Machines Corporation Auditing login activity in a distributed computing environment
US5892903A (en) * 1996-09-12 1999-04-06 Internet Security Systems, Inc. Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system
US5899999A (en) * 1996-10-16 1999-05-04 Microsoft Corporation Iterative convolution filter particularly suited for use in an image classification and retrieval system
US5905859A (en) * 1997-01-09 1999-05-18 International Business Machines Corporation Managed network device security method and apparatus
US5875296A (en) * 1997-01-28 1999-02-23 International Business Machines Corporation Distributed file system web server user authentication with cookies
US6396845B1 (en) * 1997-04-25 2002-05-28 Nec Corporation Hierarchically interconnected routers for exclusively polling low activity network nodes to reduce polling traffic
US6016553A (en) * 1997-09-05 2000-01-18 Wild File, Inc. Method, software and apparatus for saving, using and recovering data
US6199181B1 (en) * 1997-09-09 2001-03-06 Perfecto Technologies Ltd. Method and system for maintaining restricted operating environments for application programs or operating systems
US6357008B1 (en) * 1997-09-23 2002-03-12 Symantec Corporation Dynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phases
US6035323A (en) * 1997-10-24 2000-03-07 Pictra, Inc. Methods and apparatuses for distributing a collection of digital media over a network with automatic generation of presentable media
US6041347A (en) * 1997-10-24 2000-03-21 Unified Access Communications Computer system and computer-implemented process for simultaneous configuration and monitoring of a computer network
US6070244A (en) * 1997-11-10 2000-05-30 The Chase Manhattan Bank Computer network security management system
US6021510A (en) * 1997-11-24 2000-02-01 Symantec Corporation Antivirus accelerator
US6026442A (en) * 1997-11-24 2000-02-15 Cabletron Systems, Inc. Method and apparatus for surveillance in communications networks
US6052709A (en) * 1997-12-23 2000-04-18 Bright Light Technologies, Inc. Apparatus and method for controlling delivery of unsolicited electronic mail
US6035423A (en) * 1997-12-31 2000-03-07 Network Associates, Inc. Method and system for providing automated updating and upgrading of antivirus applications using a computer network
US6029256A (en) * 1997-12-31 2000-02-22 Network Associates, Inc. Method and system for allowing computer programs easy access to features of a virus scanning engine
US6195687B1 (en) * 1998-03-18 2001-02-27 Netschools Corporation Method and apparatus for master-slave control in a educational classroom communication network
US6725378B1 (en) * 1998-04-15 2004-04-20 Purdue Research Foundation Network protection for denial of service attacks
US6070190A (en) * 1998-05-11 2000-05-30 International Business Machines Corporation Client-based application availability and response monitoring and reporting for distributed computing environments
US6173413B1 (en) * 1998-05-12 2001-01-09 Sun Microsystems, Inc. Mechanism for maintaining constant permissions for multiple instances of a device within a cluster
US6397242B1 (en) * 1998-05-15 2002-05-28 Vmware, Inc. Virtualization system including a virtual machine monitor for a computer with a segmented architecture
US6347374B1 (en) * 1998-06-05 2002-02-12 Intrusion.Com, Inc. Event detection
US6889168B2 (en) * 1998-06-15 2005-05-03 Innerwall, Inc. Method and apparatus for assessing the security of a computer system
US6185689B1 (en) * 1998-06-24 2001-02-06 Richard S. Carson & Assoc., Inc. Method for network self security assessment
US6711127B1 (en) * 1998-07-31 2004-03-23 General Dynamics Government Systems Corporation System for intrusion detection and vulnerability analysis in a telecommunications signaling network
US6374358B1 (en) * 1998-08-05 2002-04-16 Sun Microsystems, Inc. Adaptive countermeasure selection method and apparatus
US6338141B1 (en) * 1998-09-30 2002-01-08 Cybersoft, Inc. Method and apparatus for computer virus detection, analysis, and removal in real time
US6230288B1 (en) * 1998-10-29 2001-05-08 Network Associates, Inc. Method of treating whitespace during virus detection
US20040010718A1 (en) * 1998-11-09 2004-01-15 Porras Phillip Andrew Network surveillance
US20030088791A1 (en) * 1998-11-09 2003-05-08 Sri International, Inc., A California Corporation Network surveillance
US6704874B1 (en) * 1998-11-09 2004-03-09 Sri International, Inc. Network-based alert management
US6708212B2 (en) * 1998-11-09 2004-03-16 Sri International Network surveillance
US6711615B2 (en) * 1998-11-09 2004-03-23 Sri International Network surveillance
US6530024B1 (en) * 1998-11-20 2003-03-04 Centrax Corporation Adaptive feedback security system and method
US6517587B2 (en) * 1998-12-08 2003-02-11 Yodlee.Com, Inc. Networked architecture for enabling automated gathering of information from Web servers
US6226372B1 (en) * 1998-12-11 2001-05-01 Securelogix Corporation Tightly integrated cooperative telecommunications firewall and scanner with distributed capabilities
US6205552B1 (en) * 1998-12-31 2001-03-20 Mci Worldcom, Inc. Method and apparatus for checking security vulnerability of networked devices
US6510523B1 (en) * 1999-02-22 2003-01-21 Sun Microsystems Inc. Method and system for providing limited access privileges with an untrusted terminal
US6839850B1 (en) * 1999-03-04 2005-01-04 Prc, Inc. Method and system for detecting intrusion into and misuse of a data processing system
US6725377B1 (en) * 1999-03-12 2004-04-20 Networks Associates Technology, Inc. Method and system for updating anti-intrusion software
US6681331B1 (en) * 1999-05-11 2004-01-20 Cylant, Inc. Dynamic software system intrusion detection
US6397245B1 (en) * 1999-06-14 2002-05-28 Hewlett-Packard Company System and method for evaluating the operation of a computer over a computer network
US6886102B1 (en) * 1999-07-14 2005-04-26 Symantec Corporation System and method for protecting a computer network against denial of service attacks
US6519647B1 (en) * 1999-07-23 2003-02-11 Microsoft Corporation Methods and apparatus for synchronizing access control in a web server
US6563959B1 (en) * 1999-07-30 2003-05-13 Pixlogic Llc Perceptual similarity image retrieval method
US6691232B1 (en) * 1999-08-05 2004-02-10 Sun Microsystems, Inc. Security architecture with environment sensitive credential sufficiency evaluation
US6851057B1 (en) * 1999-11-30 2005-02-01 Symantec Corporation Data driven detection of viruses
US6535227B1 (en) * 2000-02-08 2003-03-18 Harris Corporation System and method for assessing the security posture of a network and having a graphical user interface
US6883101B1 (en) * 2000-02-08 2005-04-19 Harris Corporation System and method for assessing the security posture of a network using goal oriented fuzzy logic decision rules
US6519703B1 (en) * 2000-04-14 2003-02-11 James B. Joyce Methods and apparatus for heuristic firewall
US6718383B1 (en) * 2000-06-02 2004-04-06 Sun Microsystems, Inc. High availability networking with virtual IP address failover
US6738600B1 (en) * 2000-08-04 2004-05-18 Harris Corporation Ceramic microelectromechanical structure
US6353385B1 (en) * 2000-08-25 2002-03-05 Hyperon Incorporated Method and system for interfacing an intrusion detection system to a central alarm system
US20020032880A1 (en) * 2000-09-07 2002-03-14 Poletto Massimiliano Antonio Monitoring network traffic denial of service attacks
US20020035698A1 (en) * 2000-09-08 2002-03-21 The Regents Of The University Of Michigan Method and system for protecting publicly accessible network computer services from undesirable network traffic in real-time
US20020032793A1 (en) * 2000-09-08 2002-03-14 The Regents Of The University Of Michigan Method and system for reconstructing a path taken by undesirable network traffic through a computer network from a source of the traffic
US20020032717A1 (en) * 2000-09-08 2002-03-14 The Regents Of The University Of Michigan Method and system for profiling network flows at a measurement point within a computer network
US20030037136A1 (en) * 2001-06-27 2003-02-20 Labovitz Craig H. Method and system for monitoring control signal traffic over a computer network
US6546493B1 (en) * 2001-11-30 2003-04-08 Networks Associates Technology, Inc. System, method and computer program product for risk assessment scanning based on detected anomalous events
US6721806B2 (en) * 2002-09-05 2004-04-13 International Business Machines Corporation Remote direct memory access enabled network interface controller switchover and switchback support

Cited By (236)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7613625B2 (en) 2001-03-29 2009-11-03 Accenture Sas Overall risk in a system
US20050114186A1 (en) * 2001-03-29 2005-05-26 Nicolas Heinrich Overall risk in a system
US6895383B2 (en) 2001-03-29 2005-05-17 Accenture Sas Overall risk in a system
US20020194059A1 (en) * 2001-06-19 2002-12-19 International Business Machines Corporation Business process control point template and method
US8135830B2 (en) 2002-01-15 2012-03-13 Mcafee, Inc. System and method for network vulnerability detection and reporting
US8615582B2 (en) 2002-01-15 2013-12-24 Mcafee, Inc. System and method for network vulnerability detection and reporting
US8700767B2 (en) * 2002-01-15 2014-04-15 Mcafee, Inc. System and method for network vulnerability detection and reporting
US7257630B2 (en) * 2002-01-15 2007-08-14 Mcafee, Inc. System and method for network vulnerability detection and reporting
US7673043B2 (en) 2002-01-15 2010-03-02 Mcafee, Inc. System and method for network vulnerability detection and reporting
US20040015728A1 (en) * 2002-01-15 2004-01-22 Cole David M. System and method for network vulnerability detection and reporting
US20120144494A1 (en) * 2002-01-15 2012-06-07 Mcafee, Inc., A Delaware Corporation System and method for network vulnerability detection and reporting
US20120144493A1 (en) * 2002-01-15 2012-06-07 Mcafee, Inc. System and method for network vulnerability detection and reporting
US8661126B2 (en) * 2002-01-15 2014-02-25 Mcafee, Inc. System and method for network vulnerability detection and reporting
US8621060B2 (en) 2002-01-15 2013-12-31 Mcafee, Inc. System and method for network vulnerability detection and reporting
US8135823B2 (en) * 2002-01-15 2012-03-13 Mcafee, Inc. System and method for network vulnerability detection and reporting
US20070283007A1 (en) * 2002-01-15 2007-12-06 Keir Robin M System And Method For Network Vulnerability Detection And Reporting
US7167983B1 (en) 2002-03-08 2007-01-23 Lucent Technologies Inc. System and method for security project management
US7299504B1 (en) 2002-03-08 2007-11-20 Lucent Technologies Inc. System and method for implementing security management using a database-modeled security policy
US7607169B1 (en) 2002-12-02 2009-10-20 Arcsight, Inc. User interface for network security console
US8613083B1 (en) 2002-12-02 2013-12-17 Hewlett-Packard Development Company, L.P. Method for batching events for transmission by software agent
US7650638B1 (en) 2002-12-02 2010-01-19 Arcsight, Inc. Network security monitoring system employing bi-directional communication
US8365278B1 (en) 2002-12-02 2013-01-29 Hewlett-Packard Development Company, L.P. Displaying information regarding time-based events
US7788722B1 (en) 2002-12-02 2010-08-31 Arcsight, Inc. Modular agent for network security intrusion detection system
US8230507B1 (en) 2002-12-02 2012-07-24 Hewlett-Packard Development Company, L.P. Modular agent for network security intrusion detection system
US8176527B1 (en) 2002-12-02 2012-05-08 Hewlett-Packard Development Company, L. P. Correlation engine with support for time-based rules
US7899901B1 (en) 2002-12-02 2011-03-01 Arcsight, Inc. Method and apparatus for exercising and debugging correlations for network security system
US8056130B1 (en) 2002-12-02 2011-11-08 Hewlett-Packard Development Company, L.P. Real time monitoring and analysis of events from multiple network security devices
US7376969B1 (en) 2002-12-02 2008-05-20 Arcsight, Inc. Real time monitoring and analysis of events from multiple network security devices
US8312535B1 (en) 2002-12-12 2012-11-13 Mcafee, Inc. System, method, and computer program product for interfacing a plurality of related applications
US8732835B2 (en) 2002-12-12 2014-05-20 Mcafee, Inc. System, method, and computer program product for interfacing a plurality of related applications
US8122498B1 (en) 2002-12-12 2012-02-21 Mcafee, Inc. Combined multiple-application alert system and method
US8230502B1 (en) 2002-12-13 2012-07-24 Mcafee, Inc. Push alert system, method, and computer program product
US8990723B1 (en) 2002-12-13 2015-03-24 Mcafee, Inc. System, method, and computer program product for managing a plurality of applications via a single interface
US8115769B1 (en) * 2002-12-13 2012-02-14 Mcafee, Inc. System, method, and computer program product for conveying a status of a plurality of security applications
US8239941B1 (en) 2002-12-13 2012-08-07 Mcafee, Inc. Push alert system, method, and computer program product
US9177140B1 (en) 2002-12-13 2015-11-03 Mcafee, Inc. System, method, and computer program product for managing a plurality of applications via a single interface
US7305709B1 (en) * 2002-12-13 2007-12-04 Mcafee, Inc. System, method, and computer program product for conveying a status of a plurality of security applications
US8074282B1 (en) 2002-12-13 2011-12-06 Mcafee, Inc. System, method, and computer program product for conveying a status of a plurality of security applications
US7624450B1 (en) * 2002-12-13 2009-11-24 Mcafee, Inc. System, method, and computer program product for conveying a status of a plurality of security applications
US9791998B2 (en) 2002-12-13 2017-10-17 Mcafee, Inc. System, method, and computer program product for managing a plurality of applications via a single interface
US8561175B2 (en) 2003-02-14 2013-10-15 Preventsys, Inc. System and method for automated policy audit and remediation management
US9094434B2 (en) 2003-02-14 2015-07-28 Mcafee, Inc. System and method for automated policy audit and remediation management
US8091117B2 (en) 2003-02-14 2012-01-03 Preventsys, Inc. System and method for interfacing with heterogeneous network data gathering tools
US8793763B2 (en) 2003-02-14 2014-07-29 Preventsys, Inc. System and method for interfacing with heterogeneous network data gathering tools
US20050010819A1 (en) * 2003-02-14 2005-01-13 Williams John Leslie System and method for generating machine auditable network policies
US7536456B2 (en) 2003-02-14 2009-05-19 Preventsys, Inc. System and method for applying a machine-processable policy rule to information gathered about a network
US8789140B2 (en) 2003-02-14 2014-07-22 Preventsys, Inc. System and method for interfacing with heterogeneous network data gathering tools
US20050015623A1 (en) * 2003-02-14 2005-01-20 Williams John Leslie System and method for security information normalization
US20040221176A1 (en) * 2003-04-29 2004-11-04 Cole Eric B. Methodology, system and computer readable medium for rating computer system vulnerabilities
US9118710B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc System, method, and computer program product for reporting an occurrence in different manners
US9118709B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US10104110B2 (en) 2003-07-01 2018-10-16 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US11310262B1 (en) * 2003-07-01 2022-04-19 Security Profiling, LLC Real-time vulnerability monitoring
US9350752B2 (en) 2003-07-01 2016-05-24 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US10893066B1 (en) 2003-07-01 2021-01-12 Securityprofiling, Llc Computer program product and apparatus for multi-path remediation
US9100431B2 (en) 2003-07-01 2015-08-04 Securityprofiling, Llc Computer program product and apparatus for multi-path remediation
US9225686B2 (en) 2003-07-01 2015-12-29 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9118711B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US8984644B2 (en) 2003-07-01 2015-03-17 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US10021124B2 (en) 2003-07-01 2018-07-10 Securityprofiling, Llc Computer program product and apparatus for multi-path remediation
US9117069B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Real-time vulnerability monitoring
US9118708B2 (en) 2003-07-01 2015-08-25 Securityprofiling, Llc Multi-path remediation
US10154055B2 (en) * 2003-07-01 2018-12-11 Securityprofiling, Llc Real-time vulnerability monitoring
US20160088010A1 (en) * 2003-07-01 2016-03-24 Securityprofiling, Llc Real-time vulnerability monitoring
US11632388B1 (en) 2003-07-01 2023-04-18 Securityprofiling, Llc Real-time vulnerability monitoring
US10050988B2 (en) 2003-07-01 2018-08-14 Securityprofiling, Llc Computer program product and apparatus for multi-path remediation
US8225407B1 (en) * 2003-08-21 2012-07-17 Symantec Corporation Incident prioritization and adaptive response recommendations
US7861299B1 (en) 2003-09-03 2010-12-28 Arcsight, Inc. Threat detection in a network security system
US9027120B1 (en) 2003-10-10 2015-05-05 Hewlett-Packard Development Company, L.P. Hierarchical architecture in a network security system
US8015604B1 (en) 2003-10-10 2011-09-06 Arcsight Inc Hierarchical architecture in a network security system
US20050086530A1 (en) * 2003-10-21 2005-04-21 International Business Machines Corp. System, method and program product to determine security risk of an application
US8214906B2 (en) 2003-10-21 2012-07-03 International Business Machines Corporation System, method and program product to determine security risk of an application
US7333999B1 (en) 2003-10-30 2008-02-19 Arcsight, Inc. Expression editor
WO2005048022A3 (en) * 2003-11-05 2006-04-27 Cisco Tech Ind Method and system for addressing intrusion attacks on a computer system
US20050097339A1 (en) * 2003-11-05 2005-05-05 Wiley Kevin L. Method and system for addressing intrusion attacks on a computer system
US7526806B2 (en) 2003-11-05 2009-04-28 Cisco Technology, Inc. Method and system for addressing intrusion attacks on a computer system
US7565696B1 (en) 2003-12-10 2009-07-21 Arcsight, Inc. Synchronizing network security devices within a network security system
US8230512B1 (en) 2003-12-10 2012-07-24 Hewlett-Packard Development Company, L.P. Timestamp modification in a network security system
US9749350B2 (en) 2003-12-22 2017-08-29 International Business Machines Corporation Assessment of network perimeter security
US9071646B2 (en) 2003-12-22 2015-06-30 International Business Machines Corporation Method, apparatus and program storage device for providing network perimeter security assessment
US9503479B2 (en) 2003-12-22 2016-11-22 International Business Machines Corporation Assessment of network perimeter security
US20050177746A1 (en) * 2003-12-22 2005-08-11 International Business Machines Corporation Method for providing network perimeter security assessment
US8561154B2 (en) 2003-12-22 2013-10-15 International Business Machines Corporation Method for providing network perimeter security assessment
US8136163B2 (en) 2004-01-16 2012-03-13 International Business Machines Corporation Method, apparatus and program storage device for providing automated tracking of security vulnerabilities
US20050160480A1 (en) * 2004-01-16 2005-07-21 International Business Machines Corporation Method, apparatus and program storage device for providing automated tracking of security vulnerabilities
US8201257B1 (en) 2004-03-31 2012-06-12 Mcafee, Inc. System and method of managing network security risks
US7519954B1 (en) 2004-04-08 2009-04-14 Mcafee, Inc. System and method of operating system identification
US8528077B1 (en) 2004-04-09 2013-09-03 Hewlett-Packard Development Company, L.P. Comparing events from multiple network security devices
US20050251860A1 (en) * 2004-05-04 2005-11-10 Kumar Saurabh Pattern discovery in a network security system
US7984502B2 (en) 2004-05-04 2011-07-19 Hewlett-Packard Development Company, L.P. Pattern discovery in a network system
US7509677B2 (en) 2004-05-04 2009-03-24 Arcsight, Inc. Pattern discovery in a network security system
US7490356B2 (en) 2004-07-20 2009-02-10 Reflectent Software, Inc. End user risk management
US7865958B2 (en) 2004-07-20 2011-01-04 Citrix Systems, Inc. End user risk management
US20060020814A1 (en) * 2004-07-20 2006-01-26 Reflectent Software, Inc. End user risk management
US20090178142A1 (en) * 2004-07-20 2009-07-09 Jason Lieblich End user risk management
US9349013B2 (en) 2004-07-23 2016-05-24 Fortinet, Inc. Vulnerability-based remediation selection
US8171555B2 (en) 2004-07-23 2012-05-01 Fortinet, Inc. Determining technology-appropriate remediation for vulnerability
US8635702B2 (en) 2004-07-23 2014-01-21 Fortinet, Inc. Determining technology-appropriate remediation for vulnerability
US20100199353A1 (en) * 2004-07-23 2010-08-05 Fortinet, Inc. Vulnerability-based remediation selection
US20060018478A1 (en) * 2004-07-23 2006-01-26 Diefenderfer Kristopher G Secure communication protocol
US20060021051A1 (en) * 2004-07-23 2006-01-26 D Mello Kurt Determining technology-appropriate remediation for vulnerability
US8561197B2 (en) 2004-07-23 2013-10-15 Fortinet, Inc. Vulnerability-based remediation selection
US7672948B2 (en) 2004-09-03 2010-03-02 Fortinet, Inc. Centralized data transformation
US9154523B2 (en) 2004-09-03 2015-10-06 Fortinet, Inc. Policy-based selection of remediation
US9392024B2 (en) 2004-09-03 2016-07-12 Fortinet, Inc. Policy-based selection of remediation
US9602550B2 (en) 2004-09-03 2017-03-21 Fortinet, Inc. Policy-based selection of remediation
US7761920B2 (en) 2004-09-03 2010-07-20 Fortinet, Inc. Data structure for policy-based remediation selection
US20060053476A1 (en) * 2004-09-03 2006-03-09 Bezilla Daniel B Data structure for policy-based remediation selection
US20060053475A1 (en) * 2004-09-03 2006-03-09 Bezilla Daniel B Policy-based selection of remediation
US20060053134A1 (en) * 2004-09-03 2006-03-09 Durham Roderick H Centralized data transformation
US20100153490A1 (en) * 2004-09-03 2010-06-17 Fortinet, Inc. Centralized data transformation
US20100257585A1 (en) * 2004-09-03 2010-10-07 Fortinet, Inc. Data structure for policy-based remediation selection
US8001600B2 (en) 2004-09-03 2011-08-16 Fortinet, Inc. Centralized data transformation
US8336103B2 (en) 2004-09-03 2012-12-18 Fortinet, Inc. Data structure for policy-based remediation selection
US8341691B2 (en) 2004-09-03 2012-12-25 Colorado Remediation Technologies, Llc Policy based selection of remediation
US20100138897A1 (en) * 2004-09-03 2010-06-03 Secure Elements, Inc. Policy-based selection of remediation
US20060053265A1 (en) * 2004-09-03 2006-03-09 Durham Roderick H Centralized data transformation
US7665119B2 (en) 2004-09-03 2010-02-16 Secure Elements, Inc. Policy-based selection of remediation
US7703137B2 (en) 2004-09-03 2010-04-20 Fortinet, Inc. Centralized data transformation
US8561134B2 (en) 2004-09-03 2013-10-15 Colorado Remediation Technologies, Llc Policy-based selection of remediation
US7644438B1 (en) 2004-10-27 2010-01-05 Arcsight, Inc. Security event aggregation at software agent
US8099782B1 (en) 2004-10-27 2012-01-17 Hewlett-Packard Development Company, L.P. Event aggregation in a network
US9100422B1 (en) 2004-10-27 2015-08-04 Hewlett-Packard Development Company, L.P. Network zone identification in a network security system
US7424742B1 (en) 2004-10-27 2008-09-09 Arcsight, Inc. Dynamic security events and event channels in a network security system
WO2006067121A1 (en) * 2004-12-20 2006-06-29 Siemens Aktiengesellschaft Method for providing a system with a secure design, associated system component and software
US7809131B1 (en) 2004-12-23 2010-10-05 Arcsight, Inc. Adjusting sensor time in a network security system
US7647632B1 (en) 2005-01-04 2010-01-12 Arcsight, Inc. Object reference in a system
US8065732B1 (en) 2005-01-04 2011-11-22 Hewlett-Packard Development Company, L.P. Object reference in a system
US8850565B2 (en) 2005-01-10 2014-09-30 Hewlett-Packard Development Company, L.P. System and method for coordinating network incident response activities
US20060212932A1 (en) * 2005-01-10 2006-09-21 Robert Patrick System and method for coordinating network incident response activities
WO2006091425A3 (en) * 2005-02-22 2007-03-15 Citadel Security Software Inc Security risk analysis system and method
US20060191012A1 (en) * 2005-02-22 2006-08-24 Banzhof Carl E Security risk analysis system and method
WO2006091425A2 (en) * 2005-02-22 2006-08-31 Citadel Security Software Inc. Security risk analysis system and method
US7278163B2 (en) * 2005-02-22 2007-10-02 Mcafee, Inc. Security risk analysis system and method
US7844999B1 (en) 2005-03-01 2010-11-30 Arcsight, Inc. Message parsing in a network security system
US20070006315A1 (en) * 2005-07-01 2007-01-04 Firas Bushnaq Network asset security risk surface assessment apparatus and method
US8261181B2 (en) 2006-03-30 2012-09-04 Microsoft Corporation Multidimensional metrics-based annotation
US7840896B2 (en) 2006-03-30 2010-11-23 Microsoft Corporation Definition and instantiation of metric based business logic reports
US7437359B2 (en) 2006-04-05 2008-10-14 Arcsight, Inc. Merging multiple log entries in accordance with merge properties and mapping properties
US20070260931A1 (en) * 2006-04-05 2007-11-08 Hector Aguilar-Macias Merging multi-line log entries
US8190992B2 (en) 2006-04-21 2012-05-29 Microsoft Corporation Grouping and display of logically defined reports
US8126750B2 (en) 2006-04-27 2012-02-28 Microsoft Corporation Consolidating data source queries for multidimensional scorecards
US7752125B1 (en) * 2006-05-24 2010-07-06 Pravin Kothari Automated enterprise risk assessment
US8132260B1 (en) 2006-06-12 2012-03-06 Redseal Systems, Inc. Methods and apparatus for prioritization of remediation techniques for network security risks
US8307444B1 (en) * 2006-06-12 2012-11-06 Redseal Networks, Inc. Methods and apparatus for determining network risk based upon incomplete network configuration data
US8321944B1 (en) * 2006-06-12 2012-11-27 Redseal Networks, Inc. Adaptive risk analysis methods and apparatus
US7890869B1 (en) 2006-06-12 2011-02-15 Redseal Systems, Inc. Network security visualization methods, apparatus and graphical user interfaces
US9058307B2 (en) 2007-01-26 2015-06-16 Microsoft Technology Licensing, Llc Presentation generation using scorecard elements
US8321805B2 (en) 2007-01-30 2012-11-27 Microsoft Corporation Service architecture based metric views
US9392026B2 (en) 2007-02-02 2016-07-12 Microsoft Technology Licensing, Llc Real time collaboration using embedded data visualizations
US8495663B2 (en) 2007-02-02 2013-07-23 Microsoft Corporation Real time collaboration using embedded data visualizations
US20080201780A1 (en) * 2007-02-20 2008-08-21 Microsoft Corporation Risk-Based Vulnerability Assessment, Remediation and Network Access Protection
US8141155B2 (en) 2007-03-16 2012-03-20 Prevari Predictive assessment of network risks
US20110162073A1 (en) * 2007-03-16 2011-06-30 Prevari Predictive Assessment of Network Risks
US20080229420A1 (en) * 2007-03-16 2008-09-18 Jeschke Konikaye Predictive Assessment of Network Risks
US7900259B2 (en) * 2007-03-16 2011-03-01 Prevari Predictive assessment of network risks
US20080282320A1 (en) * 2007-05-11 2008-11-13 Denovo Andrew Security Compliance Methodology and Tool
US20090024663A1 (en) * 2007-07-19 2009-01-22 Mcgovern Mark D Techniques for Information Security Assessment
US20100057519A1 (en) * 2008-08-27 2010-03-04 Chitra Dorai System and method for assigning service requests with due date dependent penalties
US20100125912A1 (en) * 2008-11-19 2010-05-20 Microsoft Corporation Estimating and visualizing security risk in information technology systems
US8402546B2 (en) 2008-11-19 2013-03-19 Microsoft Corporation Estimating and visualizing security risk in information technology systems
US8407801B2 (en) * 2008-12-24 2013-03-26 Kabushiki Kaisha Toshiba Security countermeasure function evaluation program
US20110302657A1 (en) * 2008-12-24 2011-12-08 Michiyo Ikegami Security countermeasure function evaluation program
US20100192228A1 (en) * 2009-01-28 2010-07-29 Hewlett-Packard Development Company, L.P. Device, method and program product for prioritizing security flaw mitigation tasks in a business service
US20110125548A1 (en) * 2009-11-25 2011-05-26 Michal Aharon Business services risk management
US20110246504A1 (en) * 2010-04-01 2011-10-06 Salesforce.Com, Inc. System, method and computer program product for performing one or more actions based on a comparison of data associated with a client to one or more criteria
US8417996B2 (en) 2010-04-19 2013-04-09 International Business Machines Corporation Facade for business risk minimization in change administration via risk estimation and mistake identification by ticket analysis
US20160359899A1 (en) * 2012-02-29 2016-12-08 Cytegic Ltd. System and method for cyber attacks analysis and decision support
US9930061B2 (en) * 2012-02-29 2018-03-27 Cytegic Ltd. System and method for cyber attacks analysis and decision support
US20130239177A1 (en) * 2012-03-07 2013-09-12 Derek SIGURDSON Controlling enterprise access by mobile devices
US9668137B2 (en) * 2012-03-07 2017-05-30 Rapid7, Inc. Controlling enterprise access by mobile devices
US9953173B2 (en) * 2012-04-12 2018-04-24 Netflix, Inc. Method and system for improving security and reliability in a networked application environment
US20130276089A1 (en) * 2012-04-12 2013-10-17 Ariel Tseitlin Method and system for improving security and reliability in a networked application environment
US20150235035A1 (en) * 2012-04-12 2015-08-20 Netflix, Inc Method and system for improving security and reliability in a networked application environment
US10691814B2 (en) 2012-04-12 2020-06-23 Netflix, Inc. Method and system for improving security and reliability in a networked application environment
US9027141B2 (en) * 2012-04-12 2015-05-05 Netflix, Inc. Method and system for improving security and reliability in a networked application environment
CN103810558A (en) * 2012-11-06 2014-05-21 财团法人资讯工业策进会 Information security audit system and method thereof
US20140130170A1 (en) * 2012-11-06 2014-05-08 Institute For Information Industry Information security audit method, system and computer readable storage medium for storing thereof
TWI482047B (en) * 2012-11-06 2015-04-21 Inst Information Industry Information security audit method, system and computer readable storage medium for storing thereof
US9003537B2 (en) 2013-01-31 2015-04-07 Hewlett-Packard Development Company, L.P. CVSS information update by analyzing vulnerability information
US20140215630A1 (en) * 2013-01-31 2014-07-31 Hewlett-Packard Development Company, L.P. Performing an Automated Compliance Audit by Vulnerabilities
US8893283B2 (en) * 2013-01-31 2014-11-18 Hewlett-Packard Development Company, L.P. Performing an automated compliance audit by vulnerabilities
US9692779B2 (en) * 2013-03-26 2017-06-27 Electronics And Telecommunications Research Institute Device for quantifying vulnerability of system and method therefor
US20160057164A1 (en) * 2013-03-26 2016-02-25 (Electronics And Telecommunications Research Institue) Device for quantifying vulnerability of system and method therefor
CN105210078A (en) * 2013-03-26 2015-12-30 韩国电子通信研究院 Device for quantifying vulnerability of system and method therefor
US20140325670A1 (en) * 2013-04-25 2014-10-30 Rivendale Software Solution Private Limited System and method for providing risk score based on sensitive information inside user device
US9516064B2 (en) * 2013-10-14 2016-12-06 Intuit Inc. Method and system for dynamic and comprehensive vulnerability management
US9501345B1 (en) 2013-12-23 2016-11-22 Intuit Inc. Method and system for creating enriched log data
US9686301B2 (en) 2014-02-03 2017-06-20 Intuit Inc. Method and system for virtual asset assisted extrusion and intrusion detection and threat scoring in a cloud computing environment
US9923909B2 (en) 2014-02-03 2018-03-20 Intuit Inc. System and method for providing a self-monitoring, self-reporting, and self-repairing virtual asset configured for extrusion and intrusion detection and threat scoring in a cloud computing environment
US10360062B2 (en) 2014-02-03 2019-07-23 Intuit Inc. System and method for providing a self-monitoring, self-reporting, and self-repairing virtual asset configured for extrusion and intrusion detection and threat scoring in a cloud computing environment
US8966639B1 (en) 2014-02-14 2015-02-24 Risk I/O, Inc. Internet breach correlation
US10305925B2 (en) 2014-02-14 2019-05-28 Kenna Security, Inc. Ordered computer vulnerability remediation reporting
US9825981B2 (en) 2014-02-14 2017-11-21 Kenna Security, Inc. Ordered computer vulnerability remediation reporting
US8984643B1 (en) * 2014-02-14 2015-03-17 Risk I/O, Inc. Ordered computer vulnerability remediation reporting
US9270695B2 (en) 2014-02-14 2016-02-23 Risk I/O, Inc. Identifying vulnerabilities of computing assets based on breach data
US10757133B2 (en) 2014-02-21 2020-08-25 Intuit Inc. Method and system for creating and deploying virtual assets
US11411984B2 (en) 2014-02-21 2022-08-09 Intuit Inc. Replacing a potentially threatening virtual asset
US9459987B2 (en) 2014-03-31 2016-10-04 Intuit Inc. Method and system for comparing different versions of a cloud based application in a production environment using segregated backend systems
US9596251B2 (en) 2014-04-07 2017-03-14 Intuit Inc. Method and system for providing security aware applications
US10055247B2 (en) 2014-04-18 2018-08-21 Intuit Inc. Method and system for enabling self-monitoring virtual assets to correlate external events with characteristic patterns associated with the virtual assets
US11294700B2 (en) 2014-04-18 2022-04-05 Intuit Inc. Method and system for enabling self-monitoring virtual assets to correlate external events with characteristic patterns associated with the virtual assets
US9900322B2 (en) 2014-04-30 2018-02-20 Intuit Inc. Method and system for providing permissions management
US9742794B2 (en) 2014-05-27 2017-08-22 Intuit Inc. Method and apparatus for automating threat model generation and pattern identification
US9866581B2 (en) 2014-06-30 2018-01-09 Intuit Inc. Method and system for secure delivery of information to computing environments
US10050997B2 (en) 2014-06-30 2018-08-14 Intuit Inc. Method and system for secure delivery of information to computing environments
WO2016016885A1 (en) * 2014-07-28 2016-02-04 B. G. Negev Technologies And Applications Ltd., At Ben-Gurion University Misuseability analysis for it infrastructure
EP3175382A4 (en) * 2014-07-28 2017-12-20 B.G. Negev Technologies & Applications Ltd., at Ben-Gurion University Misuseability analysis for it infrastructure
US10192057B2 (en) 2014-07-28 2019-01-29 B. G. Negev Technologies And Applications Ltd., At Ben-Gurion University Misuseability analysis for it infrastructure
US9473481B2 (en) 2014-07-31 2016-10-18 Intuit Inc. Method and system for providing a virtual asset perimeter
US10102082B2 (en) 2014-07-31 2018-10-16 Intuit Inc. Method and system for providing automated self-healing virtual assets
US9648036B2 (en) * 2014-12-29 2017-05-09 Palantir Technologies Inc. Systems for network risk assessment including processing of user access rights associated with a network of devices
US9882925B2 (en) 2014-12-29 2018-01-30 Palantir Technologies Inc. Systems for network risk assessment including processing of user access rights associated with a network of devices
US9985983B2 (en) 2014-12-29 2018-05-29 Palantir Technologies Inc. Systems for network risk assessment including processing of user access rights associated with a network of devices
US20170078322A1 (en) * 2014-12-29 2017-03-16 Palantir Technologies Inc. Systems for network risk assessment including processing of user access rights associated with a network of devices
US10462175B2 (en) 2014-12-29 2019-10-29 Palantir Technologies Inc. Systems for network risk assessment including processing of user access rights associated with a network of devices
US10721263B2 (en) 2014-12-29 2020-07-21 Palantir Technologies Inc. Systems for network risk assessment including processing of user access rights associated with a network of devices
US10367842B2 (en) * 2015-04-16 2019-07-30 Nec Corporation Peer-based abnormal host detection for enterprise security systems
US20220329619A1 (en) * 2015-08-27 2022-10-13 Pcms Holdings, Inc. Trustworthy cloud-based smart space rating with distributed data collection
US11394737B2 (en) * 2015-08-27 2022-07-19 Pcms Holdings, Inc. Trustworthy cloud-based smart space rating with distributed data collection
US20180241766A1 (en) * 2015-08-27 2018-08-23 Pcms Holdings, Inc. Trustworthy cloud-based smart space rating with distributed data collection
US11539720B2 (en) * 2015-12-11 2022-12-27 Servicenow, Inc. Computer network threat assessment
US20200314124A1 (en) * 2015-12-11 2020-10-01 Servicenow, Inc. Computer network threat assessment
US10990670B2 (en) * 2016-05-10 2021-04-27 Huawei Technologies Co., Ltd. Virtual network function audit method and apparatus
US10404737B1 (en) 2016-10-27 2019-09-03 Opaq Networks, Inc. Method for the continuous calculation of a cyber security risk index
US10212184B2 (en) 2016-10-27 2019-02-19 Opaq Networks, Inc. Method for the continuous calculation of a cyber security risk index
US10116681B2 (en) * 2016-12-21 2018-10-30 Denim Group, Ltd. Method of detecting shared vulnerable code
RU2649290C1 (en) * 2017-04-28 2018-03-30 Акционерное общество "Лаборатория Касперского" SYSTEM AND METHOD OF TRAFFIC FILTRATION AT DDoS-ATTACK DETECTION
US11503060B2 (en) * 2017-09-29 2022-11-15 Nec Corporation Information processing apparatus, information processing system, security assessment method, and security assessment program
US20190116193A1 (en) * 2017-10-17 2019-04-18 Yanlin Wang Risk assessment for network access control through data analytics
US11379219B2 (en) 2018-11-19 2022-07-05 Security Compass Technologies Ltd. Automation of task identification in a software lifecycle
US20220342999A1 (en) * 2019-09-27 2022-10-27 Nec Corporation Security risk analysis assistance device, method, and computer-readable medium
US20220191233A1 (en) * 2020-12-10 2022-06-16 KnowBe4, Inc. Systems and methods for improving assessment of security risk based on personal internet account data
US11552984B2 (en) * 2020-12-10 2023-01-10 KnowBe4, Inc. Systems and methods for improving assessment of security risk based on personal internet account data
US11799917B2 (en) 2021-01-25 2023-10-24 Saudi Arabian Oil Company System, method, and computing medium to remediate cybersecurity risks based on a risk rating
EP4105862A3 (en) * 2021-08-17 2023-05-03 Beijing Baidu Netcom Science Technology Co., Ltd. Data processing method and apparatus, electronic device and storage medium

Also Published As

Publication number Publication date
US7712138B2 (en) 2010-05-04
WO2002062049A2 (en) 2002-08-08
WO2002061544A2 (en) 2002-08-08
US20020104014A1 (en) 2002-08-01
AU2002243763A1 (en) 2002-08-12
US20070250935A1 (en) 2007-10-25
WO2002062049A3 (en) 2002-11-21
AU2002244083A1 (en) 2002-08-12
US7340776B2 (en) 2008-03-04
WO2002061544A3 (en) 2002-10-10

Similar Documents

Publication Publication Date Title
US20020147803A1 (en) Method and system for calculating risk in association with a security audit of a computer network
US11645396B2 (en) Cybersecurity vulnerability management based on application rank and network location
US20180181882A1 (en) Compensation data prediction
US7877266B2 (en) System and method for using social networks to facilitate business processes
US8201257B1 (en) System and method of managing network security risks
US7133808B2 (en) System and method for analyzing data streams
US20180068240A1 (en) Method and system for analyzing contact studies
US20060156408A1 (en) Method of assuring enterprise security standards compliance
US9129132B2 (en) Reporting and management of computer systems and data sources
US7792692B2 (en) Adaptive estimation of gain and revenue
US20140195397A1 (en) System and method for gathering and performing complex analyses on power data from multiple remote sources
US7577888B2 (en) Self learning signatures
US20130318567A1 (en) Reporting and Management of Computer Systems and Data Sources
US7035772B2 (en) Method and apparatus for calculating data integrity metrics for web server activity log analysis
WO2004079481A2 (en) E-business operations measurements reporting
US7369981B1 (en) Method and system for forecasting computer capacity
US20130041708A1 (en) Coordinating contending resources
US20140180899A1 (en) Trader portal system and method
US20100082377A1 (en) Risk Evaluation of Conflicts in Separation of Duties
JP3952648B2 (en) Safety policy creation device
US20050137927A1 (en) System and method for multi-site workforce deployment
US20020138608A1 (en) System and method for mapping a network
CN111429109A (en) Salary data management method, device, equipment and storage medium
EP1039401A2 (en) System and method for validating and measuring effectiveness of information security programs

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNET SECURITY SYSTEMS, INC., GEORGIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:DODD, TIMOTHY DAVID;REEL/FRAME:012763/0957

Effective date: 20020322

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: ACCENTURE SAS, FRANCE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEINRICH, NICOLAS;REEL/FRAME:017880/0993

Effective date: 20050204

AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNET SECURITY SYSTEMS, INC.;REEL/FRAME:019920/0128

Effective date: 20070928

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION,NEW YO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNET SECURITY SYSTEMS, INC.;REEL/FRAME:019920/0128

Effective date: 20070928