Method and Apparatus for Auditing Network Security
2 Assignments
0 Petitions
Accused Products
Abstract
In an apparatus for auditing security of a computer systems at least one secure application server is in communication with a global computer network. The secure application server is programmed to receive selectively security audit instruction data from a remote computer system via the global computer network. A plurality of scanning machines each are in communication with the global computer network and are programmed to execute selectively a security audit scan of the remote computer system via the global computer network. A central computer, having a memory, is configured as a database server and as a scheduler. The central computer is in communication with the secure application server and the scanning machine. The central computer is programmed to perform the following operations: evaluate a database to determine if a security audit scan is currently scheduled to be run for a user; determine which of the plurality of scanning machines is available to perform a security audit scan; copy scan-related information into a scanning machine determined to be available and instruct the scanning machine to begin scan; and record the results of the scan in the memory.
-
Citations
30 Claims
-
1-10. -10. (canceled)
-
11. An apparatus for auditing security of a remote computer system, comprising:
-
a plurality of scanning machines in communication with a global computer network and programmed to execute selectively a security audit scan of the remote computer system via the global computer network, each scanning machine capable of conducting multiple types of security assessments; and a central computer in communication with the plurality of scanning machines, programmed to perform operations comprising; determining which of the plurality of scanning machines is available to perform the security audit scan by examining a schedule for each scanning machine to identify certain ones of the scanning machines that are conducting another security audit scan or are scheduled to conduct another security audit scan, the available scanning machines comprising all of the scanning machines except for the certain scanning machines; copying scan-related information into one of the available scanning machines and instructing the scanning machine to begin the security audit scan; and recording the results of the security audit scan in the memory. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A method of auditing security, comprising the steps of:
-
determining which of a plurality of scanning machines is available to perform a security audit scan by examining a schedule for each of the scanning machines to identify certain ones of the scanning machines that are conducting another security audit scan or are scheduled to conduct another security audit scan; and instructing one of the available scanning machines to access a remote computer system to perform the security audit scan of the remote computer system. - View Dependent Claims (18, 19, 20, 21, 22)
-
-
23. A method of auditing computer system security, comprising the steps of:
-
receiving a schedule request for a security audit scan of a remote computer system; determining when the scheduled security audit scan of the remote computer system is to be executed; in response to a determination that the scheduled security audit scan of the remote computer system is to be executed in a predetermined period of time, performing the following steps; determining which of a plurality of scanning machines is available to perform the scheduled security audit scan by identifying certain ones of the scanning machines that are conducting another security audit scan or are scheduled to conduct another security audit scan; causing the scanning system to establish communication with the remote computer system; and causing the scanning system to execute the scheduled security audit scan of the remote computer system. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30)
-
Specification