Method and system of monitoring vulnerabilities
First Claim
1. A method for monitoring a vulnerability of a computer system comprising the steps of:
- specifying vulnerability information to be applied to the computer system based on configuration information on the computer system, and offering the vulnerability information to a system manager of the computer system;
receiving from the system manager an input of a record of vulnerability modification work applied to the computer system, and storing the input as a work log in a work log storing unit; and
generating vulnerability modification work information based on the work log stored in the work log storing unit, and offering the vulnerability modification work information to a supervisor of the system manager.
1 Assignment
0 Petitions
Accused Products
Abstract
A system to monitor the vulnerability of a computer system is provided. The system comprises an configuration information storing unit to store the configuration information on the computer system to be monitored, a manager information storing unit to register the information on the system manager who does the vulnerability management work for the computer system to be monitored, a vulnerability information storing unit to store various types of vulnerability information, a vulnerability information offering unit to retrieve from the aforementioned vulnerability information storing unit the vulnerability information to be applied to the computer system to be monitored based on the aforementioned configuration information and to offer it to the aforementioned system manager, and a vulnerability measure information submission unit to generate vulnerability measure information based on the work log of the vulnerability modification measures that the system manager has taken and to submit this to the supervisor of the system manager who has done the aforementioned vulnerability modification work.
160 Citations
11 Claims
-
1. A method for monitoring a vulnerability of a computer system comprising the steps of:
-
specifying vulnerability information to be applied to the computer system based on configuration information on the computer system, and offering the vulnerability information to a system manager of the computer system;
receiving from the system manager an input of a record of vulnerability modification work applied to the computer system, and storing the input as a work log in a work log storing unit; and
generating vulnerability modification work information based on the work log stored in the work log storing unit, and offering the vulnerability modification work information to a supervisor of the system manager. - View Dependent Claims (2)
-
-
3. A system for monitoring the vulnerability of a computer system to be monitored, comprising:
-
a configuration information storing unit for storing configuration information on the computer system;
a manager information storing unit for registering information on a system manager who conduct a vulnerability management work to the computer system;
a vulnerability information storing unit for storing various types of vulnerability information; and
a vulnerability information offering unit for extracting the vulnerability information from the vulnerability information storing unit based on the configuration information of the computer system, and offering the vulnerability information to the system manager of the computer system - View Dependent Claims (4, 5, 6, 7, 8, 9, 10, 11)
-
Specification