System and method for network vulnerability detection and reporting
First Claim
1. A system for detecting and tracking network security vulnerabilities, the system comprising:
- a scanning module that scans a target network to identify security vulnerabilities within specific host computers of the target network, wherein the scanning module is responsive to identification of a security vulnerability within a host computer by generating a vulnerability record that specifies the vulnerability and the host computer;
a vulnerability record management module that provides functionality for assigning the vulnerability records to specific users for correction of the security vulnerabilities specified therein, and further provides functionality for tracking a status of each such vulnerability record; and
a fix verification module that performs a vulnerability-record-specific vulnerability test to evaluate whether a security vulnerability specified by a vulnerability record has been corrected within a corresponding host computer.
13 Assignments
0 Petitions
Accused Products
Abstract
A system and method provide comprehensive and highly automated testing of vulnerabilities to intrusion on a target network, including identification of operating system, identification of target network topology and target computers, identification of open target ports, assessment of vulnerabilities on target ports, active assessment of vulnerabilities based on information acquired from target computers, quantitative assessment of target network security and vulnerability, and hierarchical graphical representation of the target network, target computers, and vulnerabilities in a test report. The system and method employ minimally obtrusive techniques to avoid interference with or damage to the target network during or after testing.
-
Citations
13 Claims
-
1. A system for detecting and tracking network security vulnerabilities, the system comprising:
-
a scanning module that scans a target network to identify security vulnerabilities within specific host computers of the target network, wherein the scanning module is responsive to identification of a security vulnerability within a host computer by generating a vulnerability record that specifies the vulnerability and the host computer;
a vulnerability record management module that provides functionality for assigning the vulnerability records to specific users for correction of the security vulnerabilities specified therein, and further provides functionality for tracking a status of each such vulnerability record; and
a fix verification module that performs a vulnerability-record-specific vulnerability test to evaluate whether a security vulnerability specified by a vulnerability record has been corrected within a corresponding host computer. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of network security vulnerability testing, comprising:
-
scanning each of a plurality of host computers on a target network to test for an existence of known security vulnerabilities within the host computers;
in response to detection of a security vulnerability within a host computer, generating a vulnerability record that is specific to the host computer, said vulnerability record specifying the detected security vulnerability; and
providing a user interface through which user actions taken with respect to the vulnerability record may be tracked, and through which a vulnerability-record-specific fix verification test may be initiated to determine whether the detected security vulnerability has been removed from the host computer. - View Dependent Claims (9, 10, 11, 12, 13)
-
Specification