System and method for identifying network security threats and assessing network security
First Claim
1. A method for security assessment of a computer network, the method comprising:
- transmitting a first executable program code from a security assessor that controls one or more security assessment computers on a network to a first end device on the network, the first executable program code for acting as an agent on the first end device, and the first executable program code configured to be executed by a browser application of the first end device,wherein the first executable program code is configured to collect software and/or hardware attribute information regarding the first end device and transmit the same to at least a first security assessment computer of the one or more security assessment computers,wherein the first executable program code is configured to collect vulnerability information of the first end device, andwherein the vulnerability information of the first end device is received by at least the first security assessment computer;
transmitting a second executable program code from the security assessor to the first end device, the second executable program code for acting as an agent on the first end device, and the second executable program code configured to be executed by the browser application of the first end device,wherein the second executable program code is selected based on the vulnerability information of the first end device received by at least the first security assessment computer, andwherein the second executable program code is configured to be used to perform a security assessment using the first end device;
displaying results of the security assessment;
selecting an artifact from the displayed results; and
automatically querying a third party security database based on the selected artifact for security information related to the artifact.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method of security assessment of a network is described. The system may include one or more security assessment computers controlled by a security assessor, and connected to a network, and first executable program code for acting as an agent on a first end device on the network. The first executable program code is configured to be executed by a browser application of the first end device, and is configured to collect software information, hardware information, and/or vulnerability information of the first end device and transmit the same to a first security assessment computer of the one or more security assessment computers. The information may be transmitted as part of a domain name server (DNS) request. The DNS request may include information identifying the first end device to thus allow modification of the first end device in response to analysis of the collected information.
40 Citations
10 Claims
-
1. A method for security assessment of a computer network, the method comprising:
-
transmitting a first executable program code from a security assessor that controls one or more security assessment computers on a network to a first end device on the network, the first executable program code for acting as an agent on the first end device, and the first executable program code configured to be executed by a browser application of the first end device, wherein the first executable program code is configured to collect software and/or hardware attribute information regarding the first end device and transmit the same to at least a first security assessment computer of the one or more security assessment computers, wherein the first executable program code is configured to collect vulnerability information of the first end device, and wherein the vulnerability information of the first end device is received by at least the first security assessment computer; transmitting a second executable program code from the security assessor to the first end device, the second executable program code for acting as an agent on the first end device, and the second executable program code configured to be executed by the browser application of the first end device, wherein the second executable program code is selected based on the vulnerability information of the first end device received by at least the first security assessment computer, and wherein the second executable program code is configured to be used to perform a security assessment using the first end device; displaying results of the security assessment; selecting an artifact from the displayed results; and automatically querying a third party security database based on the selected artifact for security information related to the artifact. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for security assessment of a computer network, the method comprising:
-
receiving a first executable program code at a first end device on the computer network, the first executable program code for acting as an agent on the first end device, and the first executable program code configured to be executed by a browser application of the first end device; executing the first executable program code via the browser application to collect software and/or hardware attribute information regarding the first end device; transmitting the software and/or hardware attribute information from the first end device to at least a first security assessment computer of a security assessor, wherein the first executable program code is configured to collect vulnerability information of the first end device, and wherein the vulnerability information of the first end device is sent to at least the first security assessment computer; receiving a second executable program code from the security assessor at the first end device, the second executable program code for acting as an agent on the first end device, and the second executable program code configured to be executed by the browser application of the first end device, wherein the second executable program code is selected based on the vulnerability information of the first end device sent to at least the first security assessment computer; executing the second executable program code by the browser application to perform a security assessment using the first end device; displaying results of the security assessment; selecting an artifact from the displayed results; and automatically querying a third party security database based on the selected artifact for security information related to the artifact. - View Dependent Claims (10)
-
Specification