Method and system for checking the security on a distributed computing environment
First Claim
1. An automated method for checking the adequacy of security in a distributed computing environment (DCE), said DCE having a plurality of nodes with at least one client and at least one server, said method comprising the steps of:
- loading a DCE security tool in said DCE, said DCE security tool being an executable program; and
in response to an input on one of said plurality of nodes;
searching for a security problem in said DCE using said DCE security tool, said searching step including;
calling a stand-alone executable program with parameters including a DCE ID and password;
verifying a validity of said DCE ID and password; and
identifying a violation if a default/original password provided to said DCE has not been changed; and
outputting a result of said searching step including said violation, if found.
1 Assignment
0 Petitions
Accused Products
Abstract
An automated method for checking the adequacy of security in a distributed computing environment (DCE) consisting of a client and a server(s). The method comprises of first loading a DCE security tool on the DCE server/client machine. The security is a software application which instantiates the security checks of the invention. The DCE security tool is executed on the DCE by entering an executable command on the client or the server. This causes the DCE security tool to automatically search for security violations or warnings and output a resulting report with any violation or warning found.
23 Citations
36 Claims
-
1. An automated method for checking the adequacy of security in a distributed computing environment (DCE), said DCE having a plurality of nodes with at least one client and at least one server, said method comprising the steps of:
-
loading a DCE security tool in said DCE, said DCE security tool being an executable program; and in response to an input on one of said plurality of nodes; searching for a security problem in said DCE using said DCE security tool, said searching step including; calling a stand-alone executable program with parameters including a DCE ID and password; verifying a validity of said DCE ID and password; and identifying a violation if a default/original password provided to said DCE has not been changed; and outputting a result of said searching step including said violation, if found. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An automated system for checking the adequacy of security in a distributed computing environment (DCE), said DCE having a plurality of nodes with at least one client and at least one server, said system comprising:
-
means for loading a DCE security tool in said DCE, said DCE security tool being an executable program; and means for searching for a security problem in said DCE using said DCE security tool; means for determining if a default shipped DCE password for DCE IDs cell administrator and root has been changed; and means for outputting a result of said searching step and said determining step to a display monitor of said DCE. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. An automated computer program product comprising:
-
a computer readable storage medium; and program code on said computer readable medium that when executed by a processing device enables the device to perform the function of checking the adequacy of security in a distributed computing environment (DCE), said DCE having a plurality of nodes with at least one client and at least one server, said program code further comprising code for performing the functions of; loading a DCE security tool in said DCE, said DCE security tool being an executable program; and in response to an input on one of said plurality of nodes, searching for a security problem in said DCE using said DCE security tool; determining if a default shipped DCE password for DCE IDs cell administrator and root has been changed; and outputting a result of said searching step and said determining step to an output device of said DCE. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification