Method and system for configuring and scheduling security audits of a computer network
First Claim
1. A computer-implemented method for configuring and scheduling a security audit of a computer network comprising the steps of:
- conducting a discovery scan to identify an element of the computer network and determine the element'"'"'s functions;
configuring an audit scan to perform on the element, wherein the audit scan is a more thorough scan than the discovery scan;
scheduling a time to perform the audit scan on the element;
running the audit scan of the element at the scheduled time;
calculating a security score for the element based on the audit scan; and
scheduling another time to repeat the audit scan on the element, the scheduling based on the results of the audit scan.
4 Assignments
0 Petitions
Accused Products
Abstract
Managing the selection and scheduling of security audits run on a computing network. The computer network is surveyed by a security audit system to determine the function and relative importance of the elements in the network. Based on function and priority, a more thorough type of security audit is selected to run against each of the network elements by the security audit system. The security audit can also be automatically scheduled based on the information gathered from the survey. Once the system runs the security audit, a vulnerability assessment can be calculated for each element in the network. The vulnerability assessment can be presented in a format that facilitates interpretation and response by someone operating the system. The vulnerability assessment can also be used to configure and schedule future security audits.
291 Citations
45 Claims
-
1. A computer-implemented method for configuring and scheduling a security audit of a computer network comprising the steps of:
-
conducting a discovery scan to identify an element of the computer network and determine the element'"'"'s functions;
configuring an audit scan to perform on the element, wherein the audit scan is a more thorough scan than the discovery scan;
scheduling a time to perform the audit scan on the element;
running the audit scan of the element at the scheduled time;
calculating a security score for the element based on the audit scan; and
scheduling another time to repeat the audit scan on the element, the scheduling based on the results of the audit scan. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
13. A computer-implemented method for configuring and scheduling a security audit of a computer network comprising the steps of:
-
conducting a discovery scan to identify an element of the computer network;
configuring an audit scan to perform on the element;
scheduling a time to perform the audit scan on the element; and
running the audit scan at the scheduled time on the element.
-
-
22. A method for assessing the security of a network comprising the steps of:
-
receiving an initial scan identifying a network element and the function of the network element;
selecting an audit scan to perform on the network element, the selection based on the initial scan, wherein the audit scan is more thorough than the initial scan;
scheduling the audit scan to perform on the network element;
performing the audit scan on the network element at the scheduled time;
receiving data from the selected audit scan of the network element; and
computing a security score for the network element from the selected audit scan. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29)
-
-
30. A method for assessing the security of a network comprising the steps of:
-
receiving an initial scan identifying a network element;
selecting an audit scan to perform on the network element, said selection based on the initial scan;
performing the selected audit scan on the network;
receiving data from the selected audit scan of the network element; and
computing a security score for the network element from the selected audit scan. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 40, 41, 42, 43, 44, 45)
-
-
39. A system for configuring and scheduling a security audit of a computer network comprising:
-
the computer network;
a security audit system operable for conducting a discovery scan to identify an element of the computer network and configuring and scheduling an audit scan of the element; and
a console operable for receiving information from the security audit system and transmitting information to the security audit system about the discovery scan and the audit scan.
-
Specification