Network monitoring method for information system, operational risk evaluation method, service business performing method, and insurance business managing method
First Claim
1. A network monitoring method for an information system comprising:
- a first step of, in at least one first computer connected to a network and executing an application, executing at least one agent to collect an operation history in the first computer;
a second step of, in at least one second computer connected to the network and monitoring the network, monitoring and recording the presence of the first computer in which the agent is not executed; and
a third step of inspecting the record to check whether or not the agent is executed in all the first computers constituting the information system.
1 Assignment
0 Petitions
Accused Products
Abstract
There is provided a method which can check whether or not internal data for operational risk evaluation of a business organization is collected from all computers in the business organization. In application execution servers, one or more agent for collecting loss events occurring in the computers is arranged. One or more network monitoring server connected to a network of the business organization is arranged. The network monitoring server monitors the network. When the application execution servers include a computer having no agent, the network monitoring server adds the presence of the computer having no agent to a monitoring log to make it possible to check whether the agents for collecting internal data is arranged in all computers for executing an application in the business organization. Therefore, an operational risk can be faithfully evaluated.
-
Citations
10 Claims
-
1. A network monitoring method for an information system comprising:
-
a first step of, in at least one first computer connected to a network and executing an application, executing at least one agent to collect an operation history in the first computer;
a second step of, in at least one second computer connected to the network and monitoring the network, monitoring and recording the presence of the first computer in which the agent is not executed; and
a third step of inspecting the record to check whether or not the agent is executed in all the first computers constituting the information system. - View Dependent Claims (2, 3)
-
-
4. An operational risk evaluation method for an information system comprising:
-
a first step of, in at least one first computer connected to a network and executing an application, executing at least one agent to collect an operation history in the first computer;
a second step of extracting an event in which a loss is generated from the collected operation history;
a third step of determining an amount of loss in the extracted event;
a fourth step of, in at least one second computer connected to the network and monitoring the network, monitoring and recording the presence of the first computer in which the agent is not executed; and
a fifth step of inspecting the record to check whether or not the agent is executed in all the first computers constituting the information system. - View Dependent Claims (5, 6)
-
-
7. A method for performing a service business for certifying correctness of an operational risk of a customer business organization, comprising:
-
a first step of, in at least one first computer connected to a network and held by the customer business organization for executing an application, executing at least one agent to collect an operation history in the first computer;
a second step of, in at least one second computer connected to the network and provided under the management of a service trader, monitoring and recording the presence of the first computer in which the agent is not executed; and
a third step of inspecting the record to check, in the service trader, whether or not the agent is executed in all the first computers constituting the information system. - View Dependent Claims (8)
-
-
9. A method of managing an insurance business for compensating a loss generated by an event corresponding to an operational risk of a customer business organization, comprising:
-
a first step of, in at least one first computer connected to a network and held by the customer business organization for executing an application, executing at least one agent to collect an operation history in the first computer;
a second step of extracting an event in which a loss is generated from the collected operation history;
a third step of determining an amount of loss in the extracted event;
a fourth step of, in at least one second computer connected to the network and provided under the management of an insurance company, monitoring and recording the presence of the first computer in which the agent is not executed; and
a fifth step of inspecting the record to check, in the insurance company, whether or not the agent is executed in all the first computers constituting the information system. - View Dependent Claims (10)
-
Specification