SYSTEM AND METHOD FOR GROUPING COMPUTER VULNERABILITIES
First Claim
1. A method comprising:
- providing a query to be displayed by a graphical user interface (GUI) of a computer that includes a processor;
using fields associated with the query to create a vulnerability set comprising at least one vulnerability;
adding the vulnerability set to a program;
updating the program by adding a new vulnerability to the vulnerability set; and
generating an asset report that includes scan results associated with the vulnerability set for the computer.
10 Assignments
0 Petitions
Accused Products
Abstract
A system and method in one embodiment includes modules for creating a vulnerability set including one or more vulnerabilities, adding the vulnerability set to a program, and updating the program by adding a new vulnerability to the vulnerability set. More specific embodiments include a program that includes a scan, creating the vulnerability set by generating a query including one or more conditions associated with the vulnerabilities, and creating the vulnerability set by selecting one or more vulnerabilities from a plurality of vulnerabilities. Other embodiments include a program that includes a report template, adding a vulnerability set to the report template by generating a query to include a condition associated with the vulnerability set, running a scan, and generating a report including one or more results from the scan meeting the condition associated with the vulnerability set.
-
Citations
20 Claims
-
1. A method comprising:
-
providing a query to be displayed by a graphical user interface (GUI) of a computer that includes a processor; using fields associated with the query to create a vulnerability set comprising at least one vulnerability; adding the vulnerability set to a program; updating the program by adding a new vulnerability to the vulnerability set; and generating an asset report that includes scan results associated with the vulnerability set for the computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus comprising:
-
a memory element configured to store data; and a processor operable to execute instructions associated with the data, wherein the apparatus is configured for; providing a query to be displayed by a graphical user interface (GUI) of a computer that includes the processor; using fields associated with the query to create a vulnerability set comprising at least one vulnerability; adding the vulnerability set to a program; updating the program by adding a new vulnerability to the vulnerability set; and generating an asset report that includes scan results associated with the vulnerability set for the computer. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. Non-transitory media that includes code for execution and when executed by a processor is operable to perform operations comprising:
-
providing a query to be displayed by a graphical user interface (GUI) of a computer that includes the processor; using fields associated with the query to create a vulnerability set comprising at least one vulnerability; adding the vulnerability set to a program; updating the program by adding a new vulnerability to the vulnerability set; and generating an asset report that includes scan results associated with the vulnerability set for the computer. - View Dependent Claims (17, 18, 19, 20)
-
Specification