METHODS AND SYSTEMS FOR INTEGRATING RECONNAISSANCE WITH SECURITY ASSESSMENTS FOR COMPUTING NETWORKS
First Claim
1. A method for security in a network environment, comprising:
- performing a security reconnaissance process on a network to be assessed for security threats utilizing information associated with the network;
identifying, based on the security reconnaissance process, an attack surface of the network to be assessed for the security threats; and
automatically determining an appropriate security assessment to be performed on the attack surface of the network.
5 Assignments
0 Petitions
Accused Products
Abstract
A reconnaissance and assessment (RA) tool can receive base information about the network, such as basic network information and details about an entity and personnel associated with network. The RA tool can utilize the base information to perform reconnaissance procedures on the network to identify the attack surface of the network. The RA tool can perform reconnaissance on the network, itself, and on other external sources, such as third party databases, search engines, and partner networks. Once the attack surface is identified, the RA tool can automatically perform appropriate security assessments on the attack surface. Additionally, if additional information is determined about the network during the security assessments, the RA tool can perform additional reconnaissance and security assessments based on the additional information.
-
Citations
36 Claims
-
1. A method for security in a network environment, comprising:
-
performing a security reconnaissance process on a network to be assessed for security threats utilizing information associated with the network; identifying, based on the security reconnaissance process, an attack surface of the network to be assessed for the security threats; and automatically determining an appropriate security assessment to be performed on the attack surface of the network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer readable storage medium embodying instruction for causing a processor to perform the method comprising:
-
performing a security reconnaissance process on a network to be assessed for security threats utilizing information associated with the network; identifying, based on the security reconnaissance process, an attack surface of the network to be assessed for the security threats; and automatically determining an appropriate security assessment to be performed on the attack surface of the network. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A system for testing security, comprising:
-
a processor; and a computer readable storage medium coupled to the processor and comprising instruction for causing the processor to perform the method comprising; performing a security reconnaissance process on a network to be assessed for security threats utilizing information associated with the network; identifying, based on the security reconnaissance process, an attack surface of the network to be assessed for the security threats; and automatically determining an appropriate security assessment to be performed on the attack surface of the network. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification