SYSTEM AND METHOD FOR REMOTELY CONDUCTING A SECURITY ASSESSMENT AND ANALYSIS OF A NETWORK
First Claim
1. A system for performing a security audit of a target network, the target network including a communication link, the system comprising:
- a device capable of establishing a connection to the target network through the communication link and the device having reverse tunneling capabilities for establishing a secure tunnel over the Internet; and
a receiving computer connected to the device through the secure tunnel established by the device over the Internet, the receiving computer sends commands to the device for performing the security audit of the target network;
wherein the device is deployed onsite near the target network and the receiving computer is located at a remote offsite location.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method for performing a security audit of a target network. The system includes a device that establishes a connection to the target network through a communication link. The device has reverse tunneling capabilities for establishing a secure tunnel over the Internet. The system also includes a receiving computer connected to the device through the secure tunnel established by the device over the Internet, and the receiving computer sends commands to the device for performing the security audit of the target network. The device is deployed onsite near the network and the receiving computer is located at a remote offsite location. Also, the device may be covertly hidden onsite near the network to simulate a malicious attack on the target network.
-
Citations
20 Claims
-
1. A system for performing a security audit of a target network, the target network including a communication link, the system comprising:
-
a device capable of establishing a connection to the target network through the communication link and the device having reverse tunneling capabilities for establishing a secure tunnel over the Internet; and a receiving computer connected to the device through the secure tunnel established by the device over the Internet, the receiving computer sends commands to the device for performing the security audit of the target network; wherein the device is deployed onsite near the target network and the receiving computer is located at a remote offsite location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for performing a security audit of a target network, the target network including a communication link, the method comprising:
-
connecting a device to the target network through the communication link; establishing a secure tunnel over the Internet between the device and a receiving computer; and sending commands from the receiving computer to the device for performing the security audit of the target network, wherein the device is deployed onsite at the target network and the receiving computer is located at a remote offsite location. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification