Method of identifying software vulnerabilities on a computer system
First Claim
1. A method of identifying a software vulnerability on a computer system having software stored thereon, the computer system being connected to a management system over a computer network, the method comprising:
- applying an interrogation program to the software, the interrogation program being capable of exploiting a known software vulnerability if it is present in the software to which the interrogation program is applied;
in the event that a software vulnerability is exploited by the interrogation program, operating the interrogation program to generate a set of management information from which can be derived the identification of the computer system; and
sending the management information to the management system.
5 Assignments
0 Petitions
Accused Products
Abstract
A method of identifying a software vulnerability on a computer system is disclosed in which the computer system has software stored thereon and is connected to a management system over a computer network. The method comprises the steps of: applying an interrogation program to the software, the interrogation program being capable of exploiting a known software vulnerability if it is present in the software to which the interrogation program is applied; in the event that the software vulnerability is exploited by the interrogation program, operating the interrogation program to generate a set of management information from which can be derived the identification of the computer system; and sending the management information to the management system.
-
Citations
27 Claims
-
1. A method of identifying a software vulnerability on a computer system having software stored thereon, the computer system being connected to a management system over a computer network, the method comprising:
- applying an interrogation program to the software, the interrogation program being capable of exploiting a known software vulnerability if it is present in the software to which the interrogation program is applied;
in the event that a software vulnerability is exploited by the interrogation program, operating the interrogation program to generate a set of management information from which can be derived the identification of the computer system; and
sending the management information to the management system. - View Dependent Claims (2, 3, 17)
- applying an interrogation program to the software, the interrogation program being capable of exploiting a known software vulnerability if it is present in the software to which the interrogation program is applied;
-
4. A method of identifying software vulnerabilities in a computer network, the computer network comprising a plurality of computer systems having software stored thereon, a scanning system capable of sending at least one interrogation program to each of the computer systems, the at least one interrogation program being arranged to exploit a known software vulnerability if it is present in the software of the computer systems to which the interrogation program is applied, and a management system, the method comprising:
-
operating the scanning system to apply the at least one interrogation program to the computer systems thereby to determine whether a known software vulnerability is exploited;
in the event that a known software vulnerability is exploited, operating the interrogation program to generate management information at the computer system on which the known software vulnerability was exploited, the management information at least identifying the computer system on which the known software vulnerability was exploited; and
sending the generated management information to the management system. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
18. A method of identifying a software vulnerability on a computer system having software stored thereon, the computer system being connected to a management system over a computer network, the method comprising:
- applying an interrogation program to the software, the interrogation program being capable of (i) exploiting a known software vulnerability if it is present in the software to which the interrogation program is applied and (ii) remediating the known software vulnerability it is arranged to exploit;
in the event that a software vulnerability is exploited by the interrogation program, operating the interrogation program to remediate the software vulnerability so exploited and generate a set of management information from which can be derived the identification of the computer system; and
sending the management information to the management system.
- applying an interrogation program to the software, the interrogation program being capable of (i) exploiting a known software vulnerability if it is present in the software to which the interrogation program is applied and (ii) remediating the known software vulnerability it is arranged to exploit;
-
19. A computer program stored on a computer usable medium, the computer program comprising computer-readable instructions arranged to operate under the control of a processing means so as to identify a software vulnerability on a computer system, the computer program performing the steps of:
- applying an interrogation program to software stored on the computer system, the interrogation program being capable of exploiting a known software vulnerability if it is present in the software to which the interrogation program is applied; and
in the event that the software vulnerability is exploited by the interrogation program, operating the interrogation program to generate a set of management information from which can be derived at least the identification of the computer system on which the software vulnerability was exploited, the computer program being capable of sending the generated management information over a computer network.
- applying an interrogation program to software stored on the computer system, the interrogation program being capable of exploiting a known software vulnerability if it is present in the software to which the interrogation program is applied; and
-
20. A computer program stored on a computer usable medium, the computer program comprising computer-readable instructions arranged to operate under the control of a processing means so as to identify software vulnerabilities in a computer network to which the processing means is connected, the computer network comprising a plurality of computer systems having software stored thereon, the computer program performing the steps of:
-
(a) sending at least one interrogation program to each computer system, the at least one interrogation program being arranged to exploit a known software vulnerability if it is present in the software of the computer system to which the interrogation program is applied, and operating the at least one interrogation program to generate management information at the computer system on which a known software vulnerability is exploited, the management information identifying the computer system and the particular software vulnerability present on that computer system; and
(b) receiving management information generated by each interrogation program. - View Dependent Claims (21, 22, 23, 24, 25)
-
-
26. A computer program stored on a computer usable medium, the computer program comprising computer-readable instructions arranged to operate under the control of a processing mean so as to identify a software vulnerability on a computer system having software stored thereon, the computer program being arranged:
- to interrogate the software of the computer system to detect the presence of a known software vulnerability if it is present in the software;
in the event that a vulnerability is detected, to generate a set of management information from which can be derived the identification of the computer system; and
to send the management information to a computer network.
- to interrogate the software of the computer system to detect the presence of a known software vulnerability if it is present in the software;
-
27. A computer network comprising:
- a scanning system;
a management system; and
a plurality of computer systems, the scanning system being arranged to send at least one interrogation program to each of the computer systems, the at least one interrogation program being arranged to exploit a known software vulnerability if it is present in the software of a computer system to which the interrogation program is applied, to generate management information in the event that a known software vulnerability is exploited, and to send the generated management information to the management system, the management information identifying the computer system on which the known vulnerability was exploited and the particular software vulnerability present on that computer system.
- a scanning system;
Specification