DETERMINING VULNERABILITY OF A WEBSITE TO SECURITY THREATS
First Claim
1. A method for determining a vulnerability of a website to at least one security threat, the method comprising:
- providing a user interface (UI);
receiving, via the UI, website data associated with the website;
based on the website data, probing the website with at least one request, the at least one request including at least one security threat signature;
receiving at least one response from the website;
comparing the at least one response to at least one expected response for the at least one request;
based on the comparison, determining the at least one security threat; and
reporting results of the determination for review.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided are methods and systems for determining a vulnerability of a website to at least one security threat. An example method can comprise providing a user interface; receiving, via the user interface, website data associated with the website; based on the website data, probing the website with at least one request, with the at least one request including at least one security threat signature; receiving at least one response from the website; comparing the least one response to at least one expected response for the at least one request; based on the comparison, determining the at least one security threat; and reporting results of the determination for review.
11 Citations
20 Claims
-
1. A method for determining a vulnerability of a website to at least one security threat, the method comprising:
-
providing a user interface (UI); receiving, via the UI, website data associated with the website; based on the website data, probing the website with at least one request, the at least one request including at least one security threat signature; receiving at least one response from the website; comparing the at least one response to at least one expected response for the at least one request; based on the comparison, determining the at least one security threat; and reporting results of the determination for review. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for determining a vulnerability of a website to at least one security threat, the system comprising:
a processor configured to; provide a user interface (UI); receive, via the UI, website data associated with the website; based on the website data, probe the website with at least one request, the at least one request including at least one security threat signature; receive at least one response from the website; compare the at least one response to at least one expected response for the at least one request; based on the comparison, determine the at least one security threat; and report results of the determination for review. - View Dependent Claims (19)
-
20. A non-transitory processor-readable medium having embodied thereon a program being executable by at least one processor to perform a method for determining a vulnerability of a website to at least one security threat, the method comprising:
-
providing a user interface (UI); receiving, via the UI, website data associated with the website; based on the website data, probing the website with at least one request, the at least one request including at least one security threat signature; receiving at least one response from the website; comparing the at least one response to at least one expected response for the at least one request; based on the comparison, determining the at least one security threat; and reporting results of the determination for review.
-
Specification