US20050171737A1 - Method and apparatus for assessing the security of a computer system - Google Patents
Method and apparatus for assessing the security of a computer system Download PDFInfo
- Publication number
- US20050171737A1 US20050171737A1 US11/100,714 US10071405A US2005171737A1 US 20050171737 A1 US20050171737 A1 US 20050171737A1 US 10071405 A US10071405 A US 10071405A US 2005171737 A1 US2005171737 A1 US 2005171737A1
- Authority
- US
- United States
- Prior art keywords
- security
- computer
- files
- module
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Definitions
- the invention described herein relates to a method and apparatus for analyzing a computer system and identifying security vulnerabilities, and more specifically to a method and apparatus for performing a series of procedures which identify security vulnerabilities and discrepancies in the computer system and in some cases suggesting and implementing corrective action.
- a first mode is a direct connection, such as through a local area network (LAN).
- the second type of connection may be made via a phone line from a remotely located computer.
- a connection may be established using the public switch telephone network (PSTN) with the server especially adapted to provide a telephonic connection.
- PSTN public switch telephone network
- a third mode is a connection established to the server made over the Internet. With a connection established in this manner, system users browsing the web may access information stored on the server.
- the inventors have recognized that although many computer systems today include certain safeguards, such as passwords, for restricting access to the server and information contained therein, it is possible that these protections may be overcome.
- the inventors have further recognized that security vulnerabilities in a computer system may be identified and certain procedures may be performed within the computer system to reduce these vulnerabilities.
- the computer system on which the security system resides may include a processor and an operational memory which contains all data which is to be analyzed by the security system described herein.
- the processor may direct a number of processing modules in the security system which perform various operations with regard to analyzing the computer system.
- the security system may also include a database which contains portions of data which may be employed by the processing modules in order to perform the various analyses of the computer system.
- the security system includes at least one security module which analyzes files and directories resident in the system memory.
- the system may further include at least one utility module which may be employed to alert a system user to detected vulnerabilities, and provide corrective suggestions, and then implement the corrections when so directed.
- Included as part of the security modules may be a configuration detection device which analyzes the system to determine a configuration and locate any unusual features.
- a directory check module function may be employed which detects security flaws that may have developed in the file system of the computer and determines if any, “security critical” files have been tampered with.
- a password security module may examine the passwords of the users with access to the computer system to detect insecure password choices.
- a network check module performs a number of processes to determine the vulnerability of the computer system when access may be gained via a data network.
- Another security module may perform an integrity check which searches files in the computer system's operational memory and makes comparisons against a store of known vulnerabilities.
- a user manager module performs an analysis of user accounts with regard to files and directories found in the operational memory. The user check may identify improper or invalid permissions and ownerships, associated with files analyzed therein.
- the system may further comprise a number of utility modules which supplement or otherwise assist the operations of the security modules.
- the utility modules may include a user manager module which may further include functionality to edit, create or delete user accounts or templates stored in the system memory.
- a file removal module may provide for the permanent removal of files from the operational memory.
- a file may be overwritten with a predetermined pattern such that no trace of the file may be identified.
- a marking module may provide the functionality to manually mark certain files which are deemed to be critical. This marking function enables the directory check to perform an analysis on this particular file to detect tampering when the directory check module is activated.
- Further functions may be included in the security system to selectively activate particular tools, schedule the automated performance of functions, or provide reports to the system user in a number of different formats.
- FIG. 1 discloses a system diagram for the security system.
- FIG. 2 discloses a system diagram for the configuration detection subsystem.
- FIG. 3 discloses a system diagram for the directory checker module.
- FIG. 4 discloses a system diagram for the user manager module.
- FIG. 5 discloses a system diagram for the integrity check subsystem.
- FIG. 6 discloses a system diagram for the network check module.
- FIG. 7 discloses a system diagram for the password checking module.
- FIG. 8 discloses a display graphic presentable on the GUI.
- FIG. 9 discloses a flow chart which describes the operation of the directory checker module.
- FIG. 10 discloses a flow chart which describes the operation of the user manager module.
- FIG. 11 discloses a flow diagram which describes the operation of the integrity check module.
- FIG. 12 discloses a flow chart which describes the operation of the network check module.
- FIG. 13 discloses a flow chart which describes the operation of the password checking module.
- FIG. 14 discloses a flow chart which describes the operation of the file removal module.
- FIG. 15 discloses a flow chart which describes the operation of the file marking module.
- Described herein is an apparatus and method for identifying vulnerabilities and discrepancies in a computer system, and in some situations, suggesting and implementing corrective action.
- the system disclosed herein is arranged in a modular/integrated form and consists of a number of securities tools and utilities, as well as a number of reporting functions. Each module may test a different aspect of the computer security.
- the method and apparatus described herein focuses on the internal security of the system, locating security problems that can be detected.
- the system identifies vulnerable configurations and, in some situations, provides instruction on how to repair particular discrepancies or detected breaches.
- FIG. 1 Disclosed in FIG. 1 is a system diagram which describes a computer system within which the system described herein may operate.
- the computer system may be implemented in a server-type computing device, such as a Unix server with connections to a data network.
- a server-type computing device such as a Unix server with connections to a data network.
- One connection established to the server may be at least one graphical user interface (GUI) 18 as part of a local area network (LAN). Connections may also be remotely established over the public switched telephone network (PSTN) 9 through a modem device incorporated in the server.
- PSTN public switched telephone network
- the server may also include an Internet connection through which users may establish a connection.
- the security system described herein may be employed by other remotely located servers which are connected via the data network to the server upon which the security system is resident.
- the server 10 may include a processor 12 which directs the processes performed by the server.
- an interface device 14 which provides connections to PSTN 9 , data network 16 , and GUI 18 .
- GUI GUI
- the interface may further include a modem device for establishing connections over the PSTN.
- the processor 12 in connection with the processor 12 is the computer system operational memory 13 which contains all the system's directories and files which the security system will perform security operations upon. Also, in connection with the processor are the processing modules 15 which perform the various security, utility, and administrative functions. These modules will be discussed in greater detail below. Finally, during the performance of the various functions certain information may be required in order to perform these processes. This information is stored in database 30 .
- the security system processing modules 15 comprise a number of security and utility modules for performing a variety of operations with regard to the computer system. The following is a brief discussion of the operation of each module.
- the configuration/setup module 17 identifies files that are “critical” to the computer system and locates any unusual features. This particular module only needs to be operated once upon installation in the computer system. In one aspect of the invention, the configuration/setup module is completely stand alone and may not generate a report.
- FIG. 2 Disclosed in FIG. 2 is a system diagram for the configuration/setup module in which the configuration detection subsystem 38 , which is a component of the configuration/setup module, accesses a number of files in the system memory, such as the file system table of contents 40 , the system configuration files 42 , and the system environmental variables 44 . Based on the information accessed, a configuration baseline 46 is generated and stored in memory such that it may then be employed by the other modules of the security system.
- the configuration detection subsystem 38 which is a component of the configuration/setup module, accesses a number of files in the system memory, such as the file system table of contents 40 , the system configuration files 42 , and the system environmental variables 44 .
- a configuration baseline 46 is generated and stored in memory such that it may then be employed by the other modules of the security system.
- the directory checker module 18 searches for computer flaws that develop in the file system of a computer over a period of time and detects if “security critical” files have been tampered with.
- the system administrator for the server is prompted for a quick fix, and if the program is capable of providing one, all the information associated with security problems, both corrected and uncorrected, is then forwarded to a reporting module for the security system.
- directory check module searches for include: globally read/writable directories, executable files that can be globally modified, protected files that have changed permission, newly created files, protected files that have changed ownership or group, protected files that have been deleted, protected files that have been tampered with, incorrect device driver permissions, tamper device driver permissions, incorrect device ownership, and insecure permissions or ownership of operating system files.
- FIG. 3 Disclosed in FIG. 3 is a system diagram for the directory check module 18 .
- the directory check module receives data from two sources. The first being the security system database 30 and the second being file system database 42 , which is a listing of files and directories in the system memory including pertinent information relating file or directory ownership, group ownership, and times in which any changes were made to the file or directory.
- file system database 42 which is a listing of files and directories in the system memory including pertinent information relating file or directory ownership, group ownership, and times in which any changes were made to the file or directory.
- the directory check module may also examine individual file permissions for nonstandard configurations. System files are compared against the database of suggested permissions for these files. If the files on the computer differ from files in the database, a prompt may be generated to change the files' rights to those suggested by the security system.
- the user manager module 20 is employed to identify improper or invalid permissions and ownerships associated with files.
- the module identifies common misconfigurations and provides reports as to any anomalies detected.
- the user manager further provides the capability to provide easy access to user account creation, creation of multiple groups, and system wide searches for user account vulnerabilities.
- the features performed by the module include creation of new accounts, creation of new user groups, searching of home directories for improper ownership, searching for nonexistent home directories, searching home directories for improper groups, and searching home directories for improper or insecure files related to some users.
- FIG. 4 A system diagram for the user manager 20 , is disclosed in FIG. 4 .
- the user manager accesses a number of different databases.
- One database is the user list 50 .
- This list contains a list of all users currently having permission to access the computer system.
- the default users template 52 contains all of the permissions given to the particular users to access particular files within the system.
- the file system table of contents 54 includes a listing of all files in the system with permissions which are granted to each.
- the user manager includes the capability to create new user accounts or user groups, as well as make amendments to user templates and file system table of contents.
- User list 56 default user template 58 and file system table of contents 60 , are all updated versions of these items following the procedures performed by the user manager. Any items worth noting during the processes performed by the user manager are output via the reporting system 29 .
- the integrity checker module 22 performs an analysis of the computer system in order to find security holes located therein.
- the analysis performed may find vulnerabilities in such things as: the type of computer/operating system used, the access privileges of files, the owner of the files, the group of the files, the date of the files, or a version number for a send mail program.
- This integrity checker module may provide such items as file name, nature of security hole, and where a system administrator may locate additional information on the particular problems detected.
- the integrity check module 22 searches for pre-existing security problems by cross-referencing against a vulnerability database which is stored in local memory.
- FIG. 5 Disclosed in FIG. 5 is a system diagram which includes the data stores accessed by the integrity check module 22 .
- the integrity check module is employed to analyze the computer system and identify vulnerabilities and discrepancies. Data to be analyzed is retrieved from the file system table of contents 72 which includes a listing of files to be analyzed.
- the vulnerability database 70 which includes a listing of potential vulnerabilities. Items contained in the vulnerability database which are employed when analyzing a file, may relate to age, owner, permissions, existence and group. Any vulnerabilities or discrepancies detected during the process are output via the report subsystem 29 .
- the network check module 24 performs various analyses to detect vulnerabilities which may occur due to a computer or server being connected to a network.
- the checks which may be performed include: checking vulnerable configuration files, detecting excessive system services, and checking for promiscuous mode operations on the network interface.
- the network check may display all services running on the network and include those not registered with the Internet Daemon.
- FIG. 6 Disclosed in FIG. 6 is a system diagram which includes the elements of the system accessed by the network check module.
- the network check module In order to check the vulnerability of the configuration files, access is gained to the system configuration files 42 .
- the operations of the network interface 14 are analyzed.
- the identification of excessive system services may be determined through analysis of a number of components such as the network interface, the processor, and a number of different files stored in memory.
- a report may be issued to the system through employment of reporting system 29 .
- the password checking module 26 is employed to examine DES-encrypted passwords associated with each user to locate weak password choices or those easily guessed. This tool may be employed to test the strength of a system front end security, as weak passwords can easily compromise the system.
- the password checking module may perform such functions as “same salting,” integration of “similar salts,” filtering of words to generate pseudo words often used as passwords, GCOC password guessing to determine the technique used by the system administrator when handing out new accounts, and large common nonrepetitive dictionaries so that multiple dictionaries that don't contain duplicate words can be used for testing.
- FIG. 7 A system diagram for the password checking module is shown in FIG. 7 .
- the module receives data input from two sources.
- the first is the password file or resume file 80 which contains all passwords for the users in the system.
- the second data input is from the word list 82 which includes all of the information to be employed by the password checking module including dictionaries.
- Output from the module is a list of insecure passwords 83 which are identified from the analysis, as well as a resume file 84 .
- the remaining processing modules relate to performing various utility and administrative functions. Under the direction of a system user, various files and directories in the system memory may be identified through the use of the modules various functions performed with regard to these items.
- the user manager 20 may be employed to generate, delete, or edit user or group directories. Further, the user manager may provide specifics for a selected user, such as user name, UID, group name, GCOC's s-field, home directory, shell, and password.
- the user manager templates can be used to create user accounts for users who share common requirements on a system.
- the file removal module 27 provides functionality to permanently delete selected files. This is accomplished by overwriting the file with bit patterns and text multiple times and then verifying that the information has been changed. This particular function provides the ability to delete individual files or groups of files.
- the file marking module 28 provides the functionality to manually mark a file which may be critical to the computer system. Through employment of the configuration directory check module described above, certain files may be designated as critical to the system. If there are other files in the system that are critical but not identified as such, then the file marking utility may be employed to mark those files. This causes the file to be checked by the directory check module each time it is run. If the directory check module detects tampering in a marked file, it will be shown in a report for that particular run of the system. This utility may also be employed to unmark files previously marked.
- the reporting module 29 provides the functionality to display to a system user, the vulnerabilities and other items generated by the security system. After modules have performed particular functions, reports may be generated which can then be presented to a system user via the GUI.
- the schedule module 32 provides the functionality to run security checks at predetermined intervals. Checks can be scheduled to run at specific designated times as well as at regular intervals such as monthly or weekly. The schedule module further provides the flexibility to run individual security modules or all tests.
- the security system is initially installed on the computer system.
- the configuration setup module 17 will run and perform an evaluation of the computer system. Once this evaluation is complete, this information is stored in memory, and the other modules may be accessed and their functions performed.
- a number of different system user interaction devices may be employed.
- a series of screen displays may be presented through the GUI which a system user may interact with in order to activate or deactivate particular functions.
- options may be provided through the GUI to run individual modules of the system, or all security modules, schedule the operation of the modules, and to receive input from the system user during the operation of the security system.
- FIG. 8 disclosed in FIG. 8 is an example of a screen display which may be employed to activate the individual modules of the security system.
- buttons are provided so that a system user may select the modules that will be employed in the analysis of the system. For example, if security button 92 is pressed, the selections enclosed in the dialogue box 98 are presented. As can be seen, these include the directory check, password check, network check, integrity check, and user check functions. User may select the processes to be performed and through selection of the execute button 100 execute these selected functions.
- the utilities button 96 is selected from the display graphic 90 .
- the file removal and file marking options will be presented to the system user.
- the reports button 94 the system user may then initiate the process of reporting or scheduling functions.
- the system user may then choose any of the security functions. For example, if the directory check function is chosen in dialogue box 98 , the directory check module 18 is initiated in the system and the steps disclosed in the flowchart of FIG. 9 are performed.
- the first step is to access files in the file system database.
- Files selected are typically used files residing in a public binary executable directory or common directories where insecurities may exist.
- the first step in the process is to access the first file in the file system. At this point, a query is made as to whether the file is a directory or not. If the file is a directory, further queries are made as to whether the file is a new file system, and if so, whether it is traversable. If the answer is yes to both queries, the directory is accessed and the files contained therein may be analyzed. If the new file system is not accessible, the function is terminated. If it is first determined that the directory is an old file system it is accessed and the files contained therein are analyzed.
- a query is made as to whether the file is “end of directory”. If so, the function is terminated. If the file is not an end of directory, a query is made as to whether the file is a device driver, in the baseline database, or is an executable file. If the answer is “no” to all these queries, this portion of the process is terminated and the next file in sequence is accessed. If a “yes” is determined for any of the queries, an analysis is then performed as to whether the permissions for the file are secure.
- the tests performed include identification of: globally read/writable directories, executable files that can be globally modified, protected files that have changed permission, newly created files, protected files that have changed ownership or group, protected files that have been deleted, protected files that have been tampered with, incorrect device driver permissions, tamper device driver permissions, incorrect device ownership, and insecure permissions or ownership of operating system files.
- the system may provide a report. Depending on the permission problem detected, the system may provide the opportunity to correct it. These corrections are included as part of the security system database. If permission is given to make the correction to the system, the correction is performed and the process returns to the next file in the file system.
- the steps disclosed in the flow chart of FIG. 10 are performed.
- the password file for the users is first loaded.
- the first user on the list is identified.
- users may be assigned a home directory in which all files related to or created by the particular user may be stored.
- a query is first made as to whether the user owns the home directory. If the user does not own the home directory, a report is generated and the process moves on to the next step.
- a query is then made as to whether the work group to which the user is affiliated owns the home directory. If it is detected that the user's group does not own the home directory to which the user is associated, a report is generated.
- an analysis is made to determine if the home directory for the user even exists. If this directory does not exist, a report is issued. In the next two steps, an analysis is made as to certain aspects of the user's account and access to the system. In either case, if the permissions provided to the user are found to be insecure, reports are issued. Once the analysis of the particular user is complete, the process returns to the top and the next user on the list is analyzed.
- FIG. 11 Disclosed in FIG. 11 is a flow chart which describes the operation of the integrity checker, when selected by the system user or otherwise automatically initiated.
- the first step in the process is to load the vulnerability database which contains a listing of possible vulnerabilities or discrepancies.
- the first file from the computer system database is then loaded and the analysis is begun.
- a first query made is to whether the detected owner of the file matches a predetermined profile. If not, this discrepancy is noted and the next entry in the database is loaded. If the response is yes, in the next step a query is made as to whether the file's group matches a predetermined profile. If not, the next entry in the database is loaded. If the answer is yes, a query is then made as to whether the file permissions match the profile.
- FIG. 12 Disclosed in FIG. 12 is a flow chart which describes the operation of the network checking module when selected by the system user or otherwise automatically initialized. This module is employed to check for vulnerabilities which may occur due to the connection of a server or computer to a data network such as a LAN or the worldwide network.
- a server or computer to a data network such as a LAN or the worldwide network.
- an analysis is performed to determine if the system is running in the promiscuous mode. This mode allows the machine to see all network packets transmitted in the network, rather than just those packets destined for the machine. If it is, a report is generated.
- an analysis is performed of the various configuration files to note any insecurities.
- a portscan is performed on all or a designated number of network access ports. Upon completion, a report may be generated and provided.
- FIG. 13 Disclosed in FIG. 13 is a flow chart which describes the operation of the password checking module when selected by the system user or otherwise automatically initiated.
- the password information is loaded from the computer system working memory.
- a query is made as to whether the password file is shadowed, and if so, this file is loaded as well.
- similar salt entries are read from the dictionary stored in the system.
- the system employs “same salting” so that there will only be a single “salt” attempt per dictionary. After a similar salt entry is chosen, the next 5,000 words from the dictionary are also read. If this is the password's first entry through the system, the GCOS password guessing process is also performed. A word filtering process is then performed to generate pseudowords that are often used as passwords.
- a query is made as to whether the password is in the list of words generated above. If the word is in the list, a query is made as to whether the word from the list is in the password. If the word is in the password, the user is removed from the list. If the word is not in the password, the word is removed from the list.
- a query is made as to whether there are any words left in the dictionary to employ for the analysis. If yes, the above process is then performed for the words that are left. If the answer is no, it is determined that the password is uncrackable according to the processes described above and a query is made as to whether this is the last user to be analyzed. If the answer is no, then word list is reset to the beginning.
- button 94 in the screen display of FIG. 4 may be selected by a system user. Upon selection of this button, a listing of the utilities modules is provided. The system user may then select one or more utility modules to run.
- FIG. 14 Disclosed in FIG. 14 is a flow chart which describes the operation of the file removal module 27 . As described above, this module provides the ability to completely delete selected files so that they are not recoverable.
- the file removal process may be initiated. The system user may select a file or files to be deleted by viewing a directory listing on the display screen. Once a file has been selected, an analysis is performed to determine whether this is a file which may be erased. For example if the file passed to the removal module isn't a direct filename (i.e., it contains “..” or “.” as a path, possibly to fool the system into wiping out a device instead of a file), the file removal module will not erase the file. If the file is not erasable, the program is terminated.
- the module then overwrites the file with a specified bit pattern. For example, this pattern may be “0101”. Once this is complete, the file system is synchronized in order to force data to be written to the drive. The file is reread back to check for differences. At this point a query is made as to whether the file has changed to the designated bit pattern. If not, a report failure to override is provided. If the override was successful, this process may then be repeated a number of times with different bit patterns. This file may then be overridden with text such as “the quick brown fox jumps over the lazy dog” in order to simulate “non-sensitive” information. The final step in the process is to unlink the file from the volume table of contents. At this point the program may be terminated.
- this pattern may be “0101”.
- FIG. 15 Disclosed in FIG. 15 is a flow diagram which describes the operation of the file marking module 28 when selected by the system user.
- this utility is employed when a file is determined to be critical but is not otherwise marked by one of the security functions.
- This utility also includes the functionality to unmark files.
- the file is selected from memory.
- the system user may view a directory and make selections.
- the database of the host's security checksum is then loaded. If a file is to be marked, the marked file is added to the end of the checksum file. If it is to removed, it removed from the database. The database is then resaved.
- a system user may schedule the performance of any of the functions performed by the security modules or the utility modules.
- a schedule option Upon the selection of a schedule option, a variety of further screens may be presented which provide the system user the choices of one or more modules scheduled, the date which the functions will be performed and the time during the dates which they will be performed. Further options may be provided such as periodic activation of the functions, one time activations of the functions, or the combination of various security and utility modules.
- a first option may be to generate reports for any individual security module, or a combination of modules.
- An option may also be provided for archiving and accessing archive reports.
- certain options may be provided through the graphical interface, as to the format of the reports. The system user may also be provided the opportunity to edit and print reports.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Computer Security & Cryptography (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Marketing (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
Description
- The present application is a continuation of U.S. patent application Ser. No. 09/834,334, filed Apr. 12, 2001, which is a continuation of U.S. patent application Ser. No. 09/333,547, filed Jun. 15, 1999, now abandoned, which claimed priority to U.S.
Provisional Patent Application 60/091,270, filed Jun. 15, 1998; these disclosures are incorporated by reference herein. - The invention described herein relates to a method and apparatus for analyzing a computer system and identifying security vulnerabilities, and more specifically to a method and apparatus for performing a series of procedures which identify security vulnerabilities and discrepancies in the computer system and in some cases suggesting and implementing corrective action.
- As the use of computers has grown over the years, especially in business, there has been a growing need to develop computer systems which allow a number of individual computer users to communicate via their computers, and have access to common repositories of data. One solution had been to have all users within an organization connect to a single large main frame computer employing terminals with minimal processing capabilities. Another solution has been the development of server technology which allows a number of individual computers to connect to a central computer, i.e. server, which includes operating systems for a number of core functions for the network such as e-mail, common data bases, as well as a number of functions which are commonly employed by these computers connected to the network.
- One advantage of employing server technology is that connections may be established to the server through a number of different modes. A first mode is a direct connection, such as through a local area network (LAN). The second type of connection may be made via a phone line from a remotely located computer. A connection may be established using the public switch telephone network (PSTN) with the server especially adapted to provide a telephonic connection. A third mode is a connection established to the server made over the Internet. With a connection established in this manner, system users browsing the web may access information stored on the server.
- With these different modes to establish connections, it may be important to protect the information stored on a server from unauthorized access. Certain protections already exist such as requiring passwords when logging onto the server and restricting access to particular types of information only to designated parties.
- The inventors have recognized that although many computer systems today include certain safeguards, such as passwords, for restricting access to the server and information contained therein, it is possible that these protections may be overcome. The inventors have further recognized that security vulnerabilities in a computer system may be identified and certain procedures may be performed within the computer system to reduce these vulnerabilities.
- Described herein is a security system which identifies security vulnerabilities and discrepancies for a computer system. In some cases the security system may suggest corrections or provide fixes for the identified vulnerabilities and discrepancies. The computer system on which the security system resides may include a processor and an operational memory which contains all data which is to be analyzed by the security system described herein. The processor may direct a number of processing modules in the security system which perform various operations with regard to analyzing the computer system. The security system may also include a database which contains portions of data which may be employed by the processing modules in order to perform the various analyses of the computer system.
- In one aspect of the invention, the security system includes at least one security module which analyzes files and directories resident in the system memory. The system may further include at least one utility module which may be employed to alert a system user to detected vulnerabilities, and provide corrective suggestions, and then implement the corrections when so directed. Included as part of the security modules may be a configuration detection device which analyzes the system to determine a configuration and locate any unusual features. Once the configuration of the computer system has been determined, a directory check module function may be employed which detects security flaws that may have developed in the file system of the computer and determines if any, “security critical” files have been tampered with. A password security module may examine the passwords of the users with access to the computer system to detect insecure password choices. A network check module performs a number of processes to determine the vulnerability of the computer system when access may be gained via a data network.
- Another security module may perform an integrity check which searches files in the computer system's operational memory and makes comparisons against a store of known vulnerabilities. A user manager module performs an analysis of user accounts with regard to files and directories found in the operational memory. The user check may identify improper or invalid permissions and ownerships, associated with files analyzed therein.
- In another aspect of the invention, the system may further comprise a number of utility modules which supplement or otherwise assist the operations of the security modules. The utility modules may include a user manager module which may further include functionality to edit, create or delete user accounts or templates stored in the system memory. A file removal module may provide for the permanent removal of files from the operational memory. A file may be overwritten with a predetermined pattern such that no trace of the file may be identified. A marking module, may provide the functionality to manually mark certain files which are deemed to be critical. This marking function enables the directory check to perform an analysis on this particular file to detect tampering when the directory check module is activated.
- Further functions may be included in the security system to selectively activate particular tools, schedule the automated performance of functions, or provide reports to the system user in a number of different formats.
- Numerous modifications and additions will be apparent to those skilled in the art upon further consideration of the invention.
-
FIG. 1 discloses a system diagram for the security system. -
FIG. 2 discloses a system diagram for the configuration detection subsystem. -
FIG. 3 discloses a system diagram for the directory checker module. -
FIG. 4 discloses a system diagram for the user manager module. -
FIG. 5 discloses a system diagram for the integrity check subsystem. -
FIG. 6 discloses a system diagram for the network check module. -
FIG. 7 discloses a system diagram for the password checking module. -
FIG. 8 discloses a display graphic presentable on the GUI. -
FIG. 9 discloses a flow chart which describes the operation of the directory checker module. -
FIG. 10 discloses a flow chart which describes the operation of the user manager module. -
FIG. 11 discloses a flow diagram which describes the operation of the integrity check module. -
FIG. 12 discloses a flow chart which describes the operation of the network check module. -
FIG. 13 discloses a flow chart which describes the operation of the password checking module. -
FIG. 14 discloses a flow chart which describes the operation of the file removal module. -
FIG. 15 discloses a flow chart which describes the operation of the file marking module. - Described herein is an apparatus and method for identifying vulnerabilities and discrepancies in a computer system, and in some situations, suggesting and implementing corrective action. The system disclosed herein is arranged in a modular/integrated form and consists of a number of securities tools and utilities, as well as a number of reporting functions. Each module may test a different aspect of the computer security. The method and apparatus described herein focuses on the internal security of the system, locating security problems that can be detected. The system identifies vulnerable configurations and, in some situations, provides instruction on how to repair particular discrepancies or detected breaches.
- Disclosed in
FIG. 1 is a system diagram which describes a computer system within which the system described herein may operate. In one embodiment of the invention, the computer system may be implemented in a server-type computing device, such as a Unix server with connections to a data network. One connection established to the server may be at least one graphical user interface (GUI) 18 as part of a local area network (LAN). Connections may also be remotely established over the public switched telephone network (PSTN) 9 through a modem device incorporated in the server. The server may also include an Internet connection through which users may establish a connection. The security system described herein may be employed by other remotely located servers which are connected via the data network to the server upon which the security system is resident. - Returning to
FIG. 1 , theserver 10 may include aprocessor 12 which directs the processes performed by the server. In connection with theprocessor 12 is aninterface device 14 which provides connections to PSTN 9,data network 16, andGUI 18. Although only one GUI is disclosed in the figure, one skilled in the art would know that multiple GUI's may be connected to the server as part of the LAN. The interface may further include a modem device for establishing connections over the PSTN. - Also, in connection with the
processor 12 is the computer systemoperational memory 13 which contains all the system's directories and files which the security system will perform security operations upon. Also, in connection with the processor are theprocessing modules 15 which perform the various security, utility, and administrative functions. These modules will be discussed in greater detail below. Finally, during the performance of the various functions certain information may be required in order to perform these processes. This information is stored indatabase 30. - As seen in
FIG. 1 the securitysystem processing modules 15 comprise a number of security and utility modules for performing a variety of operations with regard to the computer system. The following is a brief discussion of the operation of each module. - In order for the security system to operate on a particular computer system, an analysis of the system must be performed as a preliminary matter. As part of this process, the configuration/
setup module 17 identifies files that are “critical” to the computer system and locates any unusual features. This particular module only needs to be operated once upon installation in the computer system. In one aspect of the invention, the configuration/setup module is completely stand alone and may not generate a report. - Disclosed in
FIG. 2 is a system diagram for the configuration/setup module in which theconfiguration detection subsystem 38, which is a component of the configuration/setup module, accesses a number of files in the system memory, such as the file system table ofcontents 40, the system configuration files 42, and the system environmental variables 44. Based on the information accessed, aconfiguration baseline 46 is generated and stored in memory such that it may then be employed by the other modules of the security system. - During operation of the security system, the
directory checker module 18 searches for computer flaws that develop in the file system of a computer over a period of time and detects if “security critical” files have been tampered with. When a particular security problem is identified, the system administrator for the server is prompted for a quick fix, and if the program is capable of providing one, all the information associated with security problems, both corrected and uncorrected, is then forwarded to a reporting module for the security system. Certain things that the directory check module searches for include: globally read/writable directories, executable files that can be globally modified, protected files that have changed permission, newly created files, protected files that have changed ownership or group, protected files that have been deleted, protected files that have been tampered with, incorrect device driver permissions, tamper device driver permissions, incorrect device ownership, and insecure permissions or ownership of operating system files. - Disclosed in
FIG. 3 is a system diagram for thedirectory check module 18. The directory check module receives data from two sources. The first being thesecurity system database 30 and the second beingfile system database 42, which is a listing of files and directories in the system memory including pertinent information relating file or directory ownership, group ownership, and times in which any changes were made to the file or directory. Upon completion of the analysis, a report may be issued viareport module 29. - The directory check module may also examine individual file permissions for nonstandard configurations. System files are compared against the database of suggested permissions for these files. If the files on the computer differ from files in the database, a prompt may be generated to change the files' rights to those suggested by the security system.
- The
user manager module 20 is employed to identify improper or invalid permissions and ownerships associated with files. The module identifies common misconfigurations and provides reports as to any anomalies detected. The user manager further provides the capability to provide easy access to user account creation, creation of multiple groups, and system wide searches for user account vulnerabilities. The features performed by the module include creation of new accounts, creation of new user groups, searching of home directories for improper ownership, searching for nonexistent home directories, searching home directories for improper groups, and searching home directories for improper or insecure files related to some users. - A system diagram for the
user manager 20, is disclosed inFIG. 4 . In order to perform its functions, the user manager accesses a number of different databases. One database is theuser list 50. This list contains a list of all users currently having permission to access the computer system. Thedefault users template 52 contains all of the permissions given to the particular users to access particular files within the system. The file system table ofcontents 54 includes a listing of all files in the system with permissions which are granted to each. - The user manager includes the capability to create new user accounts or user groups, as well as make amendments to user templates and file system table of contents.
User list 56,default user template 58 and file system table ofcontents 60, are all updated versions of these items following the procedures performed by the user manager. Any items worth noting during the processes performed by the user manager are output via thereporting system 29. - The
integrity checker module 22 performs an analysis of the computer system in order to find security holes located therein. The analysis performed may find vulnerabilities in such things as: the type of computer/operating system used, the access privileges of files, the owner of the files, the group of the files, the date of the files, or a version number for a send mail program. This integrity checker module may provide such items as file name, nature of security hole, and where a system administrator may locate additional information on the particular problems detected. Theintegrity check module 22 searches for pre-existing security problems by cross-referencing against a vulnerability database which is stored in local memory. - Disclosed in
FIG. 5 is a system diagram which includes the data stores accessed by theintegrity check module 22. As described above, the integrity check module is employed to analyze the computer system and identify vulnerabilities and discrepancies. Data to be analyzed is retrieved from the file system table ofcontents 72 which includes a listing of files to be analyzed. Also in connection with the integrity module is thevulnerability database 70 which includes a listing of potential vulnerabilities. Items contained in the vulnerability database which are employed when analyzing a file, may relate to age, owner, permissions, existence and group. Any vulnerabilities or discrepancies detected during the process are output via thereport subsystem 29. - The
network check module 24 performs various analyses to detect vulnerabilities which may occur due to a computer or server being connected to a network. The checks which may be performed include: checking vulnerable configuration files, detecting excessive system services, and checking for promiscuous mode operations on the network interface. The network check may display all services running on the network and include those not registered with the Internet Daemon. - Disclosed in
FIG. 6 is a system diagram which includes the elements of the system accessed by the network check module. In order to check the vulnerability of the configuration files, access is gained to the system configuration files 42. In order to check other system characteristics such as promiscuous mode operations, the operations of thenetwork interface 14 are analyzed. The identification of excessive system services may be determined through analysis of a number of components such as the network interface, the processor, and a number of different files stored in memory. Upon completion of the above-described processes, a report may be issued to the system through employment of reportingsystem 29. - The
password checking module 26 is employed to examine DES-encrypted passwords associated with each user to locate weak password choices or those easily guessed. This tool may be employed to test the strength of a system front end security, as weak passwords can easily compromise the system. The password checking module may perform such functions as “same salting,” integration of “similar salts,” filtering of words to generate pseudo words often used as passwords, GCOC password guessing to determine the technique used by the system administrator when handing out new accounts, and large common nonrepetitive dictionaries so that multiple dictionaries that don't contain duplicate words can be used for testing. - A system diagram for the password checking module is shown in
FIG. 7 . The module receives data input from two sources. The first is the password file orresume file 80 which contains all passwords for the users in the system. The second data input is from theword list 82 which includes all of the information to be employed by the password checking module including dictionaries. Output from the module is a list ofinsecure passwords 83 which are identified from the analysis, as well as aresume file 84. - The remaining processing modules relate to performing various utility and administrative functions. Under the direction of a system user, various files and directories in the system memory may be identified through the use of the modules various functions performed with regard to these items. The
user manager 20, may be employed to generate, delete, or edit user or group directories. Further, the user manager may provide specifics for a selected user, such as user name, UID, group name, GCOC's s-field, home directory, shell, and password. The user manager templates can be used to create user accounts for users who share common requirements on a system. - The
file removal module 27 provides functionality to permanently delete selected files. This is accomplished by overwriting the file with bit patterns and text multiple times and then verifying that the information has been changed. This particular function provides the ability to delete individual files or groups of files. - The
file marking module 28 provides the functionality to manually mark a file which may be critical to the computer system. Through employment of the configuration directory check module described above, certain files may be designated as critical to the system. If there are other files in the system that are critical but not identified as such, then the file marking utility may be employed to mark those files. This causes the file to be checked by the directory check module each time it is run. If the directory check module detects tampering in a marked file, it will be shown in a report for that particular run of the system. This utility may also be employed to unmark files previously marked. - The reporting
module 29 provides the functionality to display to a system user, the vulnerabilities and other items generated by the security system. After modules have performed particular functions, reports may be generated which can then be presented to a system user via the GUI. - The
schedule module 32 provides the functionality to run security checks at predetermined intervals. Checks can be scheduled to run at specific designated times as well as at regular intervals such as monthly or weekly. The schedule module further provides the flexibility to run individual security modules or all tests. - In operation, the security system is initially installed on the computer system. After installation, the
configuration setup module 17 will run and perform an evaluation of the computer system. Once this evaluation is complete, this information is stored in memory, and the other modules may be accessed and their functions performed. - In order for the system to perform the functions described herein, a number of different system user interaction devices may be employed. As a first example, a series of screen displays may be presented through the GUI which a system user may interact with in order to activate or deactivate particular functions. Further, options may be provided through the GUI to run individual modules of the system, or all security modules, schedule the operation of the modules, and to receive input from the system user during the operation of the security system. For example, disclosed in
FIG. 8 is an example of a screen display which may be employed to activate the individual modules of the security system. - As can be seen in the display graphic 90, three separate interface buttons are provided so that a system user may select the modules that will be employed in the analysis of the system. For example, if
security button 92 is pressed, the selections enclosed in the dialogue box 98 are presented. As can be seen, these include the directory check, password check, network check, integrity check, and user check functions. User may select the processes to be performed and through selection of the executebutton 100 execute these selected functions. - In a situation where the utilities button 96 is selected from the display graphic 90, the file removal and file marking options will be presented to the system user. Upon selection of the reports button 94, the system user may then initiate the process of reporting or scheduling functions.
- If the security button is chosen, the system user may then choose any of the security functions. For example, if the directory check function is chosen in dialogue box 98, the
directory check module 18 is initiated in the system and the steps disclosed in the flowchart ofFIG. 9 are performed. - Once the directory check process has been initiated, the first step is to access files in the file system database. Files selected are typically used files residing in a public binary executable directory or common directories where insecurities may exist. The first step in the process is to access the first file in the file system. At this point, a query is made as to whether the file is a directory or not. If the file is a directory, further queries are made as to whether the file is a new file system, and if so, whether it is traversable. If the answer is yes to both queries, the directory is accessed and the files contained therein may be analyzed. If the new file system is not accessible, the function is terminated. If it is first determined that the directory is an old file system it is accessed and the files contained therein are analyzed.
- If the file is not a directory, a query is made as to whether the file is “end of directory”. If so, the function is terminated. If the file is not an end of directory, a query is made as to whether the file is a device driver, in the baseline database, or is an executable file. If the answer is “no” to all these queries, this portion of the process is terminated and the next file in sequence is accessed. If a “yes” is determined for any of the queries, an analysis is then performed as to whether the permissions for the file are secure. As was described above, the tests performed include identification of: globally read/writable directories, executable files that can be globally modified, protected files that have changed permission, newly created files, protected files that have changed ownership or group, protected files that have been deleted, protected files that have been tampered with, incorrect device driver permissions, tamper device driver permissions, incorrect device ownership, and insecure permissions or ownership of operating system files.
- If an insecure permission is detected, the system then may provide a report. Depending on the permission problem detected, the system may provide the opportunity to correct it. These corrections are included as part of the security system database. If permission is given to make the correction to the system, the correction is performed and the process returns to the next file in the file system.
- If the system user wishes to initiate the user check function, the steps disclosed in the flow chart of
FIG. 10 are performed. In the initial step, the password file for the users is first loaded. At this point, the first user on the list is identified. Within the computer system, users may be assigned a home directory in which all files related to or created by the particular user may be stored. A query is first made as to whether the user owns the home directory. If the user does not own the home directory, a report is generated and the process moves on to the next step. A query is then made as to whether the work group to which the user is affiliated owns the home directory. If it is detected that the user's group does not own the home directory to which the user is associated, a report is generated. - In the next step, an analysis is made to determine if the home directory for the user even exists. If this directory does not exist, a report is issued. In the next two steps, an analysis is made as to certain aspects of the user's account and access to the system. In either case, if the permissions provided to the user are found to be insecure, reports are issued. Once the analysis of the particular user is complete, the process returns to the top and the next user on the list is analyzed.
- Disclosed in
FIG. 11 is a flow chart which describes the operation of the integrity checker, when selected by the system user or otherwise automatically initiated. The first step in the process is to load the vulnerability database which contains a listing of possible vulnerabilities or discrepancies. The first file from the computer system database is then loaded and the analysis is begun. A first query made is to whether the detected owner of the file matches a predetermined profile. If not, this discrepancy is noted and the next entry in the database is loaded. If the response is yes, in the next step a query is made as to whether the file's group matches a predetermined profile. If not, the next entry in the database is loaded. If the answer is yes, a query is then made as to whether the file permissions match the profile. If they don't, this is noted and the next entry in the database is loaded. But if they do match, a query is made in the final step as to whether the file date predates a match. If the answer is no, the next entry in the database is loaded. If the answer is yes, a report is generated regarding the possible existence of a vulnerability. At the completion of the analysis of the database, a report is generated which lists all discrepancies or vulnerabilities which were noted. - Disclosed in
FIG. 12 is a flow chart which describes the operation of the network checking module when selected by the system user or otherwise automatically initialized. This module is employed to check for vulnerabilities which may occur due to the connection of a server or computer to a data network such as a LAN or the worldwide network. In the first step, an analysis is performed to determine if the system is running in the promiscuous mode. This mode allows the machine to see all network packets transmitted in the network, rather than just those packets destined for the machine. If it is, a report is generated. In the next step, an analysis is performed of the various configuration files to note any insecurities. In the final step, a portscan is performed on all or a designated number of network access ports. Upon completion, a report may be generated and provided. - Disclosed in
FIG. 13 is a flow chart which describes the operation of the password checking module when selected by the system user or otherwise automatically initiated. In the initial step the password information is loaded from the computer system working memory. A query is made as to whether the password file is shadowed, and if so, this file is loaded as well. In the next step, similar salt entries are read from the dictionary stored in the system. The system employs “same salting” so that there will only be a single “salt” attempt per dictionary. After a similar salt entry is chosen, the next 5,000 words from the dictionary are also read. If this is the password's first entry through the system, the GCOS password guessing process is also performed. A word filtering process is then performed to generate pseudowords that are often used as passwords. Once this process is performed, a query is made as to whether the password is in the list of words generated above. If the word is in the list, a query is made as to whether the word from the list is in the password. If the word is in the password, the user is removed from the list. If the word is not in the password, the word is removed from the list. - Once a word is removed from the list, a query is made as to whether there are any words left in the dictionary to employ for the analysis. If yes, the above process is then performed for the words that are left. If the answer is no, it is determined that the password is uncrackable according to the processes described above and a query is made as to whether this is the last user to be analyzed. If the answer is no, then word list is reset to the beginning.
- With regard to activating the utility modules, button 94 in the screen display of
FIG. 4 may be selected by a system user. Upon selection of this button, a listing of the utilities modules is provided. The system user may then select one or more utility modules to run. - Disclosed in
FIG. 14 is a flow chart which describes the operation of thefile removal module 27. As described above, this module provides the ability to completely delete selected files so that they are not recoverable. Once a file has been identified for removal by the system user, the file removal process may be initiated. The system user may select a file or files to be deleted by viewing a directory listing on the display screen. Once a file has been selected, an analysis is performed to determine whether this is a file which may be erased. For example if the file passed to the removal module isn't a direct filename (i.e., it contains “..” or “.” as a path, possibly to fool the system into wiping out a device instead of a file), the file removal module will not erase the file. If the file is not erasable, the program is terminated. - If it is determined that the file is overwritable, the module then overwrites the file with a specified bit pattern. For example, this pattern may be “0101”. Once this is complete, the file system is synchronized in order to force data to be written to the drive. The file is reread back to check for differences. At this point a query is made as to whether the file has changed to the designated bit pattern. If not, a report failure to override is provided. If the override was successful, this process may then be repeated a number of times with different bit patterns. This file may then be overridden with text such as “the quick brown fox jumps over the lazy dog” in order to simulate “non-sensitive” information. The final step in the process is to unlink the file from the volume table of contents. At this point the program may be terminated.
- Disclosed in
FIG. 15 is a flow diagram which describes the operation of thefile marking module 28 when selected by the system user. As was described above, this utility is employed when a file is determined to be critical but is not otherwise marked by one of the security functions. This utility also includes the functionality to unmark files. In the first step the file is selected from memory. As with the file removal module, the system user may view a directory and make selections. The database of the host's security checksum is then loaded. If a file is to be marked, the marked file is added to the end of the checksum file. If it is to removed, it removed from the database. The database is then resaved. - Also, as part of the utility modules, a system user may schedule the performance of any of the functions performed by the security modules or the utility modules. Upon the selection of a schedule option, a variety of further screens may be presented which provide the system user the choices of one or more modules scheduled, the date which the functions will be performed and the time during the dates which they will be performed. Further options may be provided such as periodic activation of the functions, one time activations of the functions, or the combination of various security and utility modules.
- Returning again to
FIG. 8 , if the system user selects the reports button 94, at least one option is provided. A first option may be to generate reports for any individual security module, or a combination of modules. An option may also be provided for archiving and accessing archive reports. In the situation where a system user is to generate a report, certain options may be provided through the graphical interface, as to the format of the reports. The system user may also be provided the opportunity to edit and print reports. - The foregoing description of the present invention has been presented for purposes of illustration and description. Furthermore, the description is not intended to limit the invention to the form disclosed herein. Consequently, variations and modifications commensurate with the above teachings, and the skill or knowledge of the relevant art, are within the scope of the present invention. The embodiments described hereinabove are further intended to explain best modes known for practicing the invention and to enable others skilled in the art to utilize the invention in such, or other, embodiments and with various modifications required by the particular applications or uses of the present invention. It is intended that the appended claims be construed to include alternative embodiments to the extent permitted by the prior art.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/100,714 US20050171737A1 (en) | 1998-06-15 | 2005-04-07 | Method and apparatus for assessing the security of a computer system |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US9127098P | 1998-06-15 | 1998-06-15 | |
US33354799A | 1999-06-15 | 1999-06-15 | |
US09/834,334 US6889168B2 (en) | 1998-06-15 | 2001-04-12 | Method and apparatus for assessing the security of a computer system |
US11/100,714 US20050171737A1 (en) | 1998-06-15 | 2005-04-07 | Method and apparatus for assessing the security of a computer system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/834,334 Continuation US6889168B2 (en) | 1998-06-15 | 2001-04-12 | Method and apparatus for assessing the security of a computer system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20050171737A1 true US20050171737A1 (en) | 2005-08-04 |
Family
ID=22226918
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/834,334 Expired - Lifetime US6889168B2 (en) | 1998-06-15 | 2001-04-12 | Method and apparatus for assessing the security of a computer system |
US11/100,714 Abandoned US20050171737A1 (en) | 1998-06-15 | 2005-04-07 | Method and apparatus for assessing the security of a computer system |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/834,334 Expired - Lifetime US6889168B2 (en) | 1998-06-15 | 2001-04-12 | Method and apparatus for assessing the security of a computer system |
Country Status (3)
Country | Link |
---|---|
US (2) | US6889168B2 (en) |
AU (1) | AU4568299A (en) |
WO (1) | WO1999066383A2 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080022401A1 (en) * | 2006-07-21 | 2008-01-24 | Sensory Networks Inc. | Apparatus and Method for Multicore Network Security Processing |
US20080141377A1 (en) * | 2006-12-07 | 2008-06-12 | Microsoft Corporation | Strategies for Investigating and Mitigating Vulnerabilities Caused by the Acquisition of Credentials |
US20080320586A1 (en) * | 2001-01-25 | 2008-12-25 | Solutionary, Inc. | Security system for a computer network having a security subsystem and a master system which monitors the integrity of a security subsystem |
US20090150971A1 (en) * | 2007-12-07 | 2009-06-11 | Srinivas Vedula | Techniques for dynamic generation and management of password dictionaries |
Families Citing this family (114)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6773769B1 (en) * | 1999-05-18 | 2004-08-10 | 3M Innovative Properties Company | Macroporous ink receiving media |
US8006243B2 (en) * | 1999-12-07 | 2011-08-23 | International Business Machines Corporation | Method and apparatus for remote installation of network drivers and software |
US6957348B1 (en) | 2000-01-10 | 2005-10-18 | Ncircle Network Security, Inc. | Interoperability of vulnerability and intrusion detection systems |
US7096502B1 (en) * | 2000-02-08 | 2006-08-22 | Harris Corporation | System and method for assessing the security posture of a network |
DE60136616D1 (en) * | 2000-03-03 | 2009-01-02 | Ibm | SYSTEM FOR DETERMINING WEAKNESSES OF WEB APPLICATIONS |
AU2001257400A1 (en) * | 2000-04-28 | 2001-11-12 | Internet Security Systems, Inc. | System and method for managing security events on a network |
US20040073617A1 (en) | 2000-06-19 | 2004-04-15 | Milliken Walter Clark | Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail |
US7181769B1 (en) * | 2000-08-25 | 2007-02-20 | Ncircle Network Security, Inc. | Network security system having a device profiler communicatively coupled to a traffic monitor |
US9027121B2 (en) * | 2000-10-10 | 2015-05-05 | International Business Machines Corporation | Method and system for creating a record for one or more computer security incidents |
US6996845B1 (en) | 2000-11-28 | 2006-02-07 | S.P.I. Dynamics Incorporated | Internet security analysis system and process |
US7284274B1 (en) * | 2001-01-18 | 2007-10-16 | Cigital, Inc. | System and method for identifying and eliminating vulnerabilities in computer software applications |
WO2002061544A2 (en) * | 2001-01-31 | 2002-08-08 | Internet Security Systems, Inc. | Method and system for configuring and scheduling security audits of a computer network |
US7325252B2 (en) * | 2001-05-18 | 2008-01-29 | Achilles Guard Inc. | Network security testing |
US7237264B1 (en) | 2001-06-04 | 2007-06-26 | Internet Security Systems, Inc. | System and method for preventing network misuse |
US7069594B1 (en) * | 2001-06-15 | 2006-06-27 | Mcafee, Inc. | File system level integrity verification and validation |
US20020199122A1 (en) * | 2001-06-22 | 2002-12-26 | Davis Lauren B. | Computer security vulnerability analysis methodology |
US7096503B1 (en) * | 2001-06-29 | 2006-08-22 | Mcafee, Inc. | Network-based risk-assessment tool for remotely detecting local computer vulnerabilities |
US7146642B1 (en) * | 2001-06-29 | 2006-12-05 | Mcafee, Inc. | System, method and computer program product for detecting modifications to risk assessment scanning caused by an intermediate device |
US7228566B2 (en) | 2001-07-10 | 2007-06-05 | Core Sdi, Incorporated | Automated computer system security compromise |
KR100505187B1 (en) * | 2001-08-08 | 2005-08-04 | 오므론 가부시키가이샤 | Device and method of authentication, and method of registration of identity of the person |
US6980978B2 (en) * | 2001-09-07 | 2005-12-27 | International Business Machines Corporation | Site integration management system for operational support service in an internet data center |
US20030135749A1 (en) * | 2001-10-31 | 2003-07-17 | Gales George S. | System and method of defining the security vulnerabilities of a computer system |
EP1461707A1 (en) * | 2001-12-31 | 2004-09-29 | Citadel Security Software Inc. | Automated computer vulnerability resolution system |
AU2003202876A1 (en) | 2002-01-04 | 2003-07-24 | Internet Security Systems, Inc. | System and method for the managed security control of processes on a computer system |
US7543056B2 (en) * | 2002-01-15 | 2009-06-02 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
US7243148B2 (en) * | 2002-01-15 | 2007-07-10 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
US7257630B2 (en) * | 2002-01-15 | 2007-08-14 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
US6941467B2 (en) * | 2002-03-08 | 2005-09-06 | Ciphertrust, Inc. | Systems and methods for adaptive message interrogation through multiple queues |
US7693947B2 (en) | 2002-03-08 | 2010-04-06 | Mcafee, Inc. | Systems and methods for graphically displaying messaging traffic |
US7694128B2 (en) | 2002-03-08 | 2010-04-06 | Mcafee, Inc. | Systems and methods for secure communication delivery |
US7903549B2 (en) * | 2002-03-08 | 2011-03-08 | Secure Computing Corporation | Content-based policy compliance systems and methods |
US8561167B2 (en) * | 2002-03-08 | 2013-10-15 | Mcafee, Inc. | Web reputation scoring |
US7870203B2 (en) * | 2002-03-08 | 2011-01-11 | Mcafee, Inc. | Methods and systems for exposing messaging reputation to an end user |
US7458098B2 (en) | 2002-03-08 | 2008-11-25 | Secure Computing Corporation | Systems and methods for enhancing electronic communication security |
US7096498B2 (en) * | 2002-03-08 | 2006-08-22 | Cipher Trust, Inc. | Systems and methods for message threat management |
US8132250B2 (en) * | 2002-03-08 | 2012-03-06 | Mcafee, Inc. | Message profiling systems and methods |
US7124438B2 (en) | 2002-03-08 | 2006-10-17 | Ciphertrust, Inc. | Systems and methods for anomaly detection in patterns of monitored communications |
US20060015942A1 (en) | 2002-03-08 | 2006-01-19 | Ciphertrust, Inc. | Systems and methods for classification of messaging entities |
US8578480B2 (en) | 2002-03-08 | 2013-11-05 | Mcafee, Inc. | Systems and methods for identifying potentially malicious messages |
US7370360B2 (en) * | 2002-05-13 | 2008-05-06 | International Business Machines Corporation | Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine |
US6792545B2 (en) | 2002-06-20 | 2004-09-14 | Guidance Software, Inc. | Enterprise computer investigation system |
US7711728B2 (en) * | 2002-06-20 | 2010-05-04 | Guidance Software, Inc. | System and method for searching for static data in a computer investigation system |
US7124209B2 (en) * | 2002-07-05 | 2006-10-17 | Kabushiki Kaisha Toshiba | Peripheral equipment of computer |
US7277937B2 (en) | 2002-07-17 | 2007-10-02 | Core Sdi, Incorporated | Distributed computing using syscall proxying |
US7035860B2 (en) | 2003-01-17 | 2006-04-25 | International Business Machines Corporation | Trusted access by an extendible framework method, system, article of manufacture, and computer program product |
US7913303B1 (en) | 2003-01-21 | 2011-03-22 | International Business Machines Corporation | Method and system for dynamically protecting a computer system from attack |
US8561175B2 (en) | 2003-02-14 | 2013-10-15 | Preventsys, Inc. | System and method for automated policy audit and remediation management |
US7627891B2 (en) * | 2003-02-14 | 2009-12-01 | Preventsys, Inc. | Network audit and policy assurance system |
US8024795B2 (en) | 2003-05-09 | 2011-09-20 | Q1 Labs, Inc. | Network intelligence system |
US8266699B2 (en) | 2003-07-01 | 2012-09-11 | SecurityProfiling Inc. | Multiple-path remediation |
US20070113272A2 (en) | 2003-07-01 | 2007-05-17 | Securityprofiling, Inc. | Real-time vulnerability monitoring |
US9118711B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9118709B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9100431B2 (en) | 2003-07-01 | 2015-08-04 | Securityprofiling, Llc | Computer program product and apparatus for multi-path remediation |
US8984644B2 (en) | 2003-07-01 | 2015-03-17 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9350752B2 (en) | 2003-07-01 | 2016-05-24 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9118708B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Multi-path remediation |
US9118710B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | System, method, and computer program product for reporting an occurrence in different manners |
US7386883B2 (en) * | 2003-07-22 | 2008-06-10 | International Business Machines Corporation | Systems, methods and computer program products for administration of computer security threat countermeasures to a computer system |
US20050022021A1 (en) * | 2003-07-22 | 2005-01-27 | Bardsley Jeffrey S. | Systems, methods and data structures for generating computer-actionable computer security threat management information |
US7657938B2 (en) * | 2003-10-28 | 2010-02-02 | International Business Machines Corporation | Method and system for protecting computer networks by altering unwanted network data traffic |
US7269725B2 (en) | 2003-12-17 | 2007-09-11 | Lenovo (Singapore) Pte. Ltd. | Autonomic binding of subsystems to system to prevent theft |
US8561154B2 (en) | 2003-12-22 | 2013-10-15 | International Business Machines Corporation | Method for providing network perimeter security assessment |
US20050138402A1 (en) * | 2003-12-23 | 2005-06-23 | Yoon Jeonghee M. | Methods and apparatus for hierarchical system validation |
US20050198512A1 (en) * | 2004-03-02 | 2005-09-08 | International Business Machines Corporation | System, method and program product for managing privilege levels in a computer system |
US7370345B2 (en) * | 2004-03-02 | 2008-05-06 | Lenovo Singapore Pte. Ltd | Domain controlling systems, methods and computer program products for administration of computer security threat countermeasures to a domain of target computer systems |
US8201257B1 (en) | 2004-03-31 | 2012-06-12 | Mcafee, Inc. | System and method of managing network security risks |
US7519954B1 (en) | 2004-04-08 | 2009-04-14 | Mcafee, Inc. | System and method of operating system identification |
US7698275B2 (en) * | 2004-05-21 | 2010-04-13 | Computer Associates Think, Inc. | System and method for providing remediation management |
US8458793B2 (en) * | 2004-07-13 | 2013-06-04 | International Business Machines Corporation | Methods, computer program products and data structures for intrusion detection, intrusion response and vulnerability remediation across target computer systems |
US20060018478A1 (en) * | 2004-07-23 | 2006-01-26 | Diefenderfer Kristopher G | Secure communication protocol |
US8171555B2 (en) | 2004-07-23 | 2012-05-01 | Fortinet, Inc. | Determining technology-appropriate remediation for vulnerability |
US7665119B2 (en) | 2004-09-03 | 2010-02-16 | Secure Elements, Inc. | Policy-based selection of remediation |
US7774848B2 (en) | 2004-07-23 | 2010-08-10 | Fortinet, Inc. | Mapping remediation to plurality of vulnerabilities |
US7761920B2 (en) * | 2004-09-03 | 2010-07-20 | Fortinet, Inc. | Data structure for policy-based remediation selection |
US7672948B2 (en) * | 2004-09-03 | 2010-03-02 | Fortinet, Inc. | Centralized data transformation |
US7703137B2 (en) * | 2004-09-03 | 2010-04-20 | Fortinet, Inc. | Centralized data transformation |
US20060101517A1 (en) * | 2004-10-28 | 2006-05-11 | Banzhof Carl E | Inventory management-based computer vulnerability resolution system |
US20060101519A1 (en) * | 2004-11-05 | 2006-05-11 | Lasswell Kevin W | Method to provide customized vulnerability information to a plurality of organizations |
US8635690B2 (en) * | 2004-11-05 | 2014-01-21 | Mcafee, Inc. | Reputation based message processing |
US20060174123A1 (en) * | 2005-01-28 | 2006-08-03 | Hackett Ronald D | System and method for detecting, analyzing and controlling hidden data embedded in computer files |
US7278163B2 (en) * | 2005-02-22 | 2007-10-02 | Mcafee, Inc. | Security risk analysis system and method |
US7937480B2 (en) * | 2005-06-02 | 2011-05-03 | Mcafee, Inc. | Aggregation of reputation data |
US8918883B1 (en) * | 2005-06-15 | 2014-12-23 | Tripwire, Inc. | Prioritizing network security vulnerabilities using accessibility |
EP1934840A4 (en) * | 2005-10-06 | 2010-12-15 | Guidance Software Inc | Electronic discovery system and method |
US7661136B1 (en) | 2005-12-13 | 2010-02-09 | At&T Intellectual Property Ii, L.P. | Detecting anomalous web proxy activity |
US8892735B2 (en) * | 2006-09-28 | 2014-11-18 | Guidance Software, Inc. | Phone home servlet in a computer investigation system |
US8763114B2 (en) * | 2007-01-24 | 2014-06-24 | Mcafee, Inc. | Detecting image spam |
US7779156B2 (en) * | 2007-01-24 | 2010-08-17 | Mcafee, Inc. | Reputation based load balancing |
US8179798B2 (en) * | 2007-01-24 | 2012-05-15 | Mcafee, Inc. | Reputation based connection throttling |
US8214497B2 (en) | 2007-01-24 | 2012-07-03 | Mcafee, Inc. | Multi-dimensional reputation scoring |
US7949716B2 (en) | 2007-01-24 | 2011-05-24 | Mcafee, Inc. | Correlation and analysis of entity attributes |
US8302196B2 (en) * | 2007-03-20 | 2012-10-30 | Microsoft Corporation | Combining assessment models and client targeting to identify network security vulnerabilities |
US8365289B2 (en) * | 2007-04-12 | 2013-01-29 | Core Sdi, Incorporated | System and method for providing network penetration testing |
US7770203B2 (en) * | 2007-04-17 | 2010-08-03 | International Business Machines Corporation | Method of integrating a security operations policy into a threat management vector |
US8185930B2 (en) | 2007-11-06 | 2012-05-22 | Mcafee, Inc. | Adjusting filter or classification control settings |
US8045458B2 (en) * | 2007-11-08 | 2011-10-25 | Mcafee, Inc. | Prioritizing network traffic |
US20090125980A1 (en) * | 2007-11-09 | 2009-05-14 | Secure Computing Corporation | Network rating |
US8160975B2 (en) * | 2008-01-25 | 2012-04-17 | Mcafee, Inc. | Granular support vector machine with random granularity |
US8589503B2 (en) | 2008-04-04 | 2013-11-19 | Mcafee, Inc. | Prioritizing network traffic |
US8621638B2 (en) | 2010-05-14 | 2013-12-31 | Mcafee, Inc. | Systems and methods for classification of messaging entities |
US9122877B2 (en) | 2011-03-21 | 2015-09-01 | Mcafee, Inc. | System and method for malware and network reputation correlation |
US8931043B2 (en) | 2012-04-10 | 2015-01-06 | Mcafee Inc. | System and method for determining and using local reputations of users and hosts to protect information in a network environment |
US20130275576A1 (en) * | 2012-04-11 | 2013-10-17 | Yr20 Group, Inc. | Network condition-based monitoring analysis engine |
WO2014113501A1 (en) * | 2013-01-15 | 2014-07-24 | Beyondtrust Software, Inc. | Systems and methods for identifying and reporting application and file vulnerabilities |
US9467465B2 (en) | 2013-02-25 | 2016-10-11 | Beyondtrust Software, Inc. | Systems and methods of risk based rules for application control |
US9270694B2 (en) * | 2013-05-21 | 2016-02-23 | Rapid7, Llc | Systems and methods for assessing security for a network of assets and providing recommendations |
US9386027B2 (en) * | 2014-08-11 | 2016-07-05 | Indiana University Research & Technology Corporation | Detection of pileup vulnerabilities in mobile operating systems |
US10318742B1 (en) * | 2016-11-28 | 2019-06-11 | Symantec Corporation | Systems and methods for evaluating security software configurations |
US10395016B2 (en) * | 2017-01-24 | 2019-08-27 | International Business Machines Corporation | Communication pattern recognition |
US10977361B2 (en) | 2017-05-16 | 2021-04-13 | Beyondtrust Software, Inc. | Systems and methods for controlling privileged operations |
GB2584018B (en) | 2019-04-26 | 2022-04-13 | Beyondtrust Software Inc | Root-level application selective configuration |
US12242600B2 (en) * | 2021-05-13 | 2025-03-04 | Microsoft Technology Licensing, Llc | Abnormally permissive role definition detection systems |
CN113268743B (en) * | 2021-06-25 | 2023-12-12 | 深圳谷探科技有限公司 | Method for improving safety of movable ring monitoring system |
Citations (98)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5022077A (en) * | 1989-08-25 | 1991-06-04 | International Business Machines Corp. | Apparatus and method for preventing unauthorized access to BIOS in a personal computer system |
US5121345A (en) * | 1988-11-03 | 1992-06-09 | Lentz Stephen A | System and method for protecting integrity of computer data and software |
US5144659A (en) * | 1989-04-19 | 1992-09-01 | Richard P. Jones | Computer file protection system |
US5263147A (en) * | 1991-03-01 | 1993-11-16 | Hughes Training, Inc. | System for providing high security for personal computers and workstations |
US5278901A (en) * | 1992-04-30 | 1994-01-11 | International Business Machines Corporation | Pattern-oriented intrusion-detection system and method |
US5283830A (en) * | 1991-12-17 | 1994-02-01 | International Computers Limited | Security mechanism for a computer system |
US5311591A (en) * | 1992-05-15 | 1994-05-10 | Fischer Addison M | Computer system security method and apparatus for creating and using program authorization information data structures |
US5319776A (en) * | 1990-04-19 | 1994-06-07 | Hilgraeve Corporation | In transit detection of computer virus with safeguard |
US5359659A (en) * | 1992-06-19 | 1994-10-25 | Doren Rosenthal | Method for securing software against corruption by computer viruses |
US5361359A (en) * | 1992-08-31 | 1994-11-01 | Trusted Information Systems, Inc. | System and method for controlling the use of a computer |
US5379342A (en) * | 1993-01-07 | 1995-01-03 | International Business Machines Corp. | Method and apparatus for providing enhanced data verification in a computer system |
US5398196A (en) * | 1993-07-29 | 1995-03-14 | Chambers; David A. | Method and apparatus for detection of computer viruses |
US5414833A (en) * | 1993-10-27 | 1995-05-09 | International Business Machines Corporation | Network security system and method using a parallel finite state machine adaptive active monitor and responder |
US5421006A (en) * | 1992-05-07 | 1995-05-30 | Compaq Computer Corp. | Method and apparatus for assessing integrity of computer system software |
US5440723A (en) * | 1993-01-19 | 1995-08-08 | International Business Machines Corporation | Automatic immune system for computers and computer networks |
US5444850A (en) * | 1993-08-04 | 1995-08-22 | Trend Micro Devices Incorporated | Method and apparatus for controlling network and workstation access prior to workstation boot |
US5452442A (en) * | 1993-01-19 | 1995-09-19 | International Business Machines Corporation | Methods and apparatus for evaluating and extracting signatures of computer viruses and other undesirable software entities |
US5483649A (en) * | 1994-07-01 | 1996-01-09 | Ybm Technologies, Inc. | Personal computer security system |
US5485575A (en) * | 1994-11-21 | 1996-01-16 | International Business Machines Corporation | Automatic analysis of a computer virus structure and means of attachment to its hosts |
US5485409A (en) * | 1992-04-30 | 1996-01-16 | International Business Machines Corporation | Automated penetration analysis system and method |
US5491752A (en) * | 1993-03-18 | 1996-02-13 | Digital Equipment Corporation, Patent Law Group | System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authentication tokens |
US5502815A (en) * | 1992-03-30 | 1996-03-26 | Cozza; Paul D. | Method and apparatus for increasing the speed at which computer viruses are detected |
US5511184A (en) * | 1991-04-22 | 1996-04-23 | Acer Incorporated | Method and apparatus for protecting a computer system from computer viruses |
US5524238A (en) * | 1994-03-23 | 1996-06-04 | Breakout I/O Corporation | User specific intelligent interface which intercepts and either replaces or passes commands to a data identity and the field accessed |
US5537540A (en) * | 1994-09-30 | 1996-07-16 | Compaq Computer Corporation | Transparent, secure computer virus detection method and apparatus |
US5550984A (en) * | 1994-12-07 | 1996-08-27 | Matsushita Electric Corporation Of America | Security system for preventing unauthorized communications between networks by translating communications received in ip protocol to non-ip protocol to remove address and routing services information |
US5553239A (en) * | 1994-11-10 | 1996-09-03 | At&T Corporation | Management facility for server entry and application utilization in a multi-node server configuration |
US5559960A (en) * | 1995-04-21 | 1996-09-24 | Lettvin; Jonathan D. | Software anti-virus facility |
US5740441A (en) * | 1994-12-20 | 1998-04-14 | Sun Microsystems, Inc. | Bytecode program interpreter apparatus and method with pre-verification of data type restrictions and object initialization |
US5761421A (en) * | 1996-03-25 | 1998-06-02 | Sun Microsystems, Inc. | System and method for secure peer-to-peer communication between downloaded programs |
US5765030A (en) * | 1996-07-19 | 1998-06-09 | Symantec Corp | Processor emulator module having a variable pre-fetch queue size for program execution |
US5765204A (en) * | 1996-06-05 | 1998-06-09 | International Business Machines Corporation | Method and apparatus for adaptive localization of frequently accessed, randomly addressed data |
US5774650A (en) * | 1993-09-03 | 1998-06-30 | International Business Machines Corporation | Control of access to a networked system |
US5784459A (en) * | 1996-08-15 | 1998-07-21 | International Business Machines Corporation | Method and apparatus for secure, remote swapping of memory resident active entities |
US5787169A (en) * | 1995-12-28 | 1998-07-28 | International Business Machines Corp. | Method and apparatus for controlling access to encrypted data files in a computer system |
US5796825A (en) * | 1996-01-16 | 1998-08-18 | Symantec Corporation | System for automatic decryption of file data on a per-use basis and automatic re-encryption within context of multi-threaded operating system under which applications run in real-time |
US5802277A (en) * | 1995-07-31 | 1998-09-01 | International Business Machines Corporation | Virus protection in computer systems |
US5805829A (en) * | 1996-10-01 | 1998-09-08 | International Business Machines Corp | Process for running applets over non-IP networks |
US5809230A (en) * | 1996-01-16 | 1998-09-15 | Mclellan Software International, Llc | System and method for controlling access to personal computer system resources |
US5809287A (en) * | 1994-09-08 | 1998-09-15 | Compaq Computer Corporation | Automatic computer upgrading |
US5812763A (en) * | 1988-02-17 | 1998-09-22 | Digital Equipment Corporation | Expert system having a plurality of security inspectors for detecting security flaws in a computer system |
US5825877A (en) * | 1996-06-11 | 1998-10-20 | International Business Machines Corporation | Support for portable trusted software |
US5826012A (en) * | 1995-04-21 | 1998-10-20 | Lettvin; Jonathan D. | Boot-time anti-virus and maintenance facility |
US5832488A (en) * | 1995-03-29 | 1998-11-03 | Stuart S. Bowie | Computer system and method for storing medical histories using a smartcard to store data |
US5832208A (en) * | 1996-09-05 | 1998-11-03 | Cheyenne Software International Sales Corp. | Anti-virus agent for use with databases and mail servers |
US5859966A (en) * | 1995-10-10 | 1999-01-12 | Data General Corporation | Security system for computer systems |
US5864683A (en) * | 1994-10-12 | 1999-01-26 | Secure Computing Corporartion | System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights |
US5867651A (en) * | 1996-08-27 | 1999-02-02 | International Business Machines Corporation | System for providing custom functionality to client systems by redirecting of messages through a user configurable filter network having a plurality of partially interconnected filters |
US5878258A (en) * | 1996-05-06 | 1999-03-02 | Merrill Lynch, Pierce, Fenner & Smith | Seamless application interface manager |
US5884033A (en) * | 1996-05-15 | 1999-03-16 | Spyglass, Inc. | Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering actions |
US5889943A (en) * | 1995-09-26 | 1999-03-30 | Trend Micro Incorporated | Apparatus and method for electronic mail virus detection and elimination |
US5892904A (en) * | 1996-12-06 | 1999-04-06 | Microsoft Corporation | Code certification for network transmission |
US5892903A (en) * | 1996-09-12 | 1999-04-06 | Internet Security Systems, Inc. | Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system |
US5911143A (en) * | 1994-08-15 | 1999-06-08 | International Business Machines Corporation | Method and system for advanced role-based access control in distributed and centralized computer systems |
US5918228A (en) * | 1997-01-28 | 1999-06-29 | International Business Machines Corporation | Method and apparatus for enabling a web server to impersonate a user of a distributed file system to obtain secure access to supported web documents |
US5919258A (en) * | 1996-02-08 | 1999-07-06 | Hitachi, Ltd. | Security system and method for computers connected to network |
US5931946A (en) * | 1996-02-08 | 1999-08-03 | Hitachi, Ltd. | Network system having external/internal audit system for computer security |
US5937157A (en) * | 1995-06-22 | 1999-08-10 | International Business Machines Corporation | Information processing apparatus and a control method |
US5944821A (en) * | 1996-07-11 | 1999-08-31 | Compaq Computer Corporation | Secure software registration and integrity assessment in a computer system |
US5951698A (en) * | 1996-10-02 | 1999-09-14 | Trend Micro, Incorporated | System, apparatus and method for the detection and removal of viruses in macros |
US5956481A (en) * | 1997-02-06 | 1999-09-21 | Microsoft Corporation | Method and apparatus for protecting data files on a computer from virus infection |
US5960170A (en) * | 1997-03-18 | 1999-09-28 | Trend Micro, Inc. | Event triggered iterative virus detection |
US5958050A (en) * | 1996-09-24 | 1999-09-28 | Electric Communities | Trusted delegation system |
US5961644A (en) * | 1997-09-19 | 1999-10-05 | International Business Machines Corporation | Method and apparatus for testing the integrity of computer security alarm systems |
US5964889A (en) * | 1997-04-16 | 1999-10-12 | Symantec Corporation | Method to analyze a program for presence of computer viruses by examining the opcode for faults before emulating instruction in emulator |
US5974549A (en) * | 1997-03-27 | 1999-10-26 | Soliton Ltd. | Security monitor |
US5978914A (en) * | 1995-01-23 | 1999-11-02 | Tandem Computers Incorporated | Method and apparatus for preventing inadvertent changes to system-critical files in a computing system |
US6014666A (en) * | 1997-10-28 | 2000-01-11 | Microsoft Corporation | Declarative and programmatic access control of component-based server applications using roles |
US6029145A (en) * | 1997-01-06 | 2000-02-22 | Isogon Corporation | Software license verification process and apparatus |
US6070244A (en) * | 1997-11-10 | 2000-05-30 | The Chase Manhattan Bank | Computer network security management system |
US6070239A (en) * | 1995-12-08 | 2000-05-30 | Sun Microsystems, Inc. | System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources |
US6073239A (en) * | 1995-12-28 | 2000-06-06 | In-Defense, Inc. | Method for protecting executable software programs against infection by software viruses |
US6080207A (en) * | 1998-06-04 | 2000-06-27 | Gateway 2000, Inc. | System and method of creating and delivering software |
US6088679A (en) * | 1997-12-01 | 2000-07-11 | The United States Of America As Represented By The Secretary Of Commerce | Workflow management employing role-based access control |
US6088803A (en) * | 1997-12-30 | 2000-07-11 | Intel Corporation | System for virus-checking network data during download to a client device |
US6108786A (en) * | 1997-04-25 | 2000-08-22 | Intel Corporation | Monitor network bindings for computer security |
US6125390A (en) * | 1994-04-05 | 2000-09-26 | Intel Corporation | Method and apparatus for monitoring and controlling in a network |
US6185678B1 (en) * | 1997-10-02 | 2001-02-06 | Trustees Of The University Of Pennsylvania | Secure and reliable bootstrap architecture |
US6185689B1 (en) * | 1998-06-24 | 2001-02-06 | Richard S. Carson & Assoc., Inc. | Method for network self security assessment |
US6205551B1 (en) * | 1998-01-29 | 2001-03-20 | Lucent Technologies Inc. | Computer security using virus probing |
US6237096B1 (en) * | 1995-01-17 | 2001-05-22 | Eoriginal Inc. | System and method for electronic transmission storage and retrieval of authenticated documents |
US6263442B1 (en) * | 1996-05-30 | 2001-07-17 | Sun Microsystems, Inc. | System and method for securing a program's execution in a network environment |
US6282709B1 (en) * | 1997-11-12 | 2001-08-28 | Philips Electronics North America Corporation | Software update manager |
US6298445B1 (en) * | 1998-04-30 | 2001-10-02 | Netect, Ltd. | Computer security |
US6366930B1 (en) * | 1996-04-12 | 2002-04-02 | Computer Associates Think, Inc. | Intelligent data inventory & asset management systems method and apparatus |
US6381602B1 (en) * | 1999-01-26 | 2002-04-30 | Microsoft Corporation | Enforcing access control on resources at a location other than the source location |
US6389539B1 (en) * | 1998-09-30 | 2002-05-14 | International Business Machines Corporation | Method and system for enhancing security access to a data processing system |
US6405318B1 (en) * | 1999-03-12 | 2002-06-11 | Psionic Software, Inc. | Intrusion detection system |
US6505300B2 (en) * | 1998-06-12 | 2003-01-07 | Microsoft Corporation | Method and system for secure running of untrusted content |
US6535855B1 (en) * | 1997-12-09 | 2003-03-18 | The Chase Manhattan Bank | Push banking system and method |
US6571338B1 (en) * | 1995-12-20 | 2003-05-27 | Sun Microsystems Inc. | Maintaining packet security in a computer network |
US6766454B1 (en) * | 1997-04-08 | 2004-07-20 | Visto Corporation | System and method for using an authentication applet to identify and authenticate a user in a computer network |
US6802028B1 (en) * | 1996-11-11 | 2004-10-05 | Powerquest Corporation | Computer virus detection and removal |
US6804780B1 (en) * | 1996-11-08 | 2004-10-12 | Finjan Software, Ltd. | System and method for protecting a computer and a network from hostile downloadables |
US7185332B1 (en) * | 1998-03-25 | 2007-02-27 | Symantec Corporation | Multi-tiered incremental software updating |
US7240368B1 (en) * | 1999-04-14 | 2007-07-03 | Verizon Corporate Services Group Inc. | Intrusion and misuse deterrence system employing a virtual network |
US7263718B2 (en) * | 1999-02-09 | 2007-08-28 | Secure Computing Corporation | Security framework for supporting kernel-based hypervisors within a computing system |
US7363655B2 (en) * | 1998-02-12 | 2008-04-22 | Auctnyc 8 Llc | Computer virus screening methods and systems |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5892943A (en) | 1996-12-30 | 1999-04-06 | Standard Microsystems Corp. | Shared bios ROM warm boot |
-
1999
- 1999-06-15 AU AU45682/99A patent/AU4568299A/en not_active Abandoned
- 1999-06-15 WO PCT/US1999/013476 patent/WO1999066383A2/en active Application Filing
-
2001
- 2001-04-12 US US09/834,334 patent/US6889168B2/en not_active Expired - Lifetime
-
2005
- 2005-04-07 US US11/100,714 patent/US20050171737A1/en not_active Abandoned
Patent Citations (101)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5812763A (en) * | 1988-02-17 | 1998-09-22 | Digital Equipment Corporation | Expert system having a plurality of security inspectors for detecting security flaws in a computer system |
US5121345A (en) * | 1988-11-03 | 1992-06-09 | Lentz Stephen A | System and method for protecting integrity of computer data and software |
US5144659A (en) * | 1989-04-19 | 1992-09-01 | Richard P. Jones | Computer file protection system |
US5022077A (en) * | 1989-08-25 | 1991-06-04 | International Business Machines Corp. | Apparatus and method for preventing unauthorized access to BIOS in a personal computer system |
US5319776A (en) * | 1990-04-19 | 1994-06-07 | Hilgraeve Corporation | In transit detection of computer virus with safeguard |
US5263147A (en) * | 1991-03-01 | 1993-11-16 | Hughes Training, Inc. | System for providing high security for personal computers and workstations |
US5511184A (en) * | 1991-04-22 | 1996-04-23 | Acer Incorporated | Method and apparatus for protecting a computer system from computer viruses |
US5283830A (en) * | 1991-12-17 | 1994-02-01 | International Computers Limited | Security mechanism for a computer system |
US5502815A (en) * | 1992-03-30 | 1996-03-26 | Cozza; Paul D. | Method and apparatus for increasing the speed at which computer viruses are detected |
US5485409A (en) * | 1992-04-30 | 1996-01-16 | International Business Machines Corporation | Automated penetration analysis system and method |
US5278901A (en) * | 1992-04-30 | 1994-01-11 | International Business Machines Corporation | Pattern-oriented intrusion-detection system and method |
US5421006A (en) * | 1992-05-07 | 1995-05-30 | Compaq Computer Corp. | Method and apparatus for assessing integrity of computer system software |
US5311591A (en) * | 1992-05-15 | 1994-05-10 | Fischer Addison M | Computer system security method and apparatus for creating and using program authorization information data structures |
US5412717A (en) * | 1992-05-15 | 1995-05-02 | Fischer; Addison M. | Computer system security method and apparatus having program authorization information data structures |
US5359659A (en) * | 1992-06-19 | 1994-10-25 | Doren Rosenthal | Method for securing software against corruption by computer viruses |
US5361359A (en) * | 1992-08-31 | 1994-11-01 | Trusted Information Systems, Inc. | System and method for controlling the use of a computer |
US5379342A (en) * | 1993-01-07 | 1995-01-03 | International Business Machines Corp. | Method and apparatus for providing enhanced data verification in a computer system |
US5440723A (en) * | 1993-01-19 | 1995-08-08 | International Business Machines Corporation | Automatic immune system for computers and computer networks |
US5452442A (en) * | 1993-01-19 | 1995-09-19 | International Business Machines Corporation | Methods and apparatus for evaluating and extracting signatures of computer viruses and other undesirable software entities |
US5491752A (en) * | 1993-03-18 | 1996-02-13 | Digital Equipment Corporation, Patent Law Group | System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authentication tokens |
US5398196A (en) * | 1993-07-29 | 1995-03-14 | Chambers; David A. | Method and apparatus for detection of computer viruses |
US5444850A (en) * | 1993-08-04 | 1995-08-22 | Trend Micro Devices Incorporated | Method and apparatus for controlling network and workstation access prior to workstation boot |
US5774650A (en) * | 1993-09-03 | 1998-06-30 | International Business Machines Corporation | Control of access to a networked system |
US5414833A (en) * | 1993-10-27 | 1995-05-09 | International Business Machines Corporation | Network security system and method using a parallel finite state machine adaptive active monitor and responder |
US5524238A (en) * | 1994-03-23 | 1996-06-04 | Breakout I/O Corporation | User specific intelligent interface which intercepts and either replaces or passes commands to a data identity and the field accessed |
US6125390A (en) * | 1994-04-05 | 2000-09-26 | Intel Corporation | Method and apparatus for monitoring and controlling in a network |
US5483649A (en) * | 1994-07-01 | 1996-01-09 | Ybm Technologies, Inc. | Personal computer security system |
US5911143A (en) * | 1994-08-15 | 1999-06-08 | International Business Machines Corporation | Method and system for advanced role-based access control in distributed and centralized computer systems |
US5809287A (en) * | 1994-09-08 | 1998-09-15 | Compaq Computer Corporation | Automatic computer upgrading |
US5537540A (en) * | 1994-09-30 | 1996-07-16 | Compaq Computer Corporation | Transparent, secure computer virus detection method and apparatus |
US5864683A (en) * | 1994-10-12 | 1999-01-26 | Secure Computing Corporartion | System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights |
US5553239A (en) * | 1994-11-10 | 1996-09-03 | At&T Corporation | Management facility for server entry and application utilization in a multi-node server configuration |
US5485575A (en) * | 1994-11-21 | 1996-01-16 | International Business Machines Corporation | Automatic analysis of a computer virus structure and means of attachment to its hosts |
US5550984A (en) * | 1994-12-07 | 1996-08-27 | Matsushita Electric Corporation Of America | Security system for preventing unauthorized communications between networks by translating communications received in ip protocol to non-ip protocol to remove address and routing services information |
US5740441A (en) * | 1994-12-20 | 1998-04-14 | Sun Microsystems, Inc. | Bytecode program interpreter apparatus and method with pre-verification of data type restrictions and object initialization |
US6237096B1 (en) * | 1995-01-17 | 2001-05-22 | Eoriginal Inc. | System and method for electronic transmission storage and retrieval of authenticated documents |
US5978914A (en) * | 1995-01-23 | 1999-11-02 | Tandem Computers Incorporated | Method and apparatus for preventing inadvertent changes to system-critical files in a computing system |
US5832488A (en) * | 1995-03-29 | 1998-11-03 | Stuart S. Bowie | Computer system and method for storing medical histories using a smartcard to store data |
US5826012A (en) * | 1995-04-21 | 1998-10-20 | Lettvin; Jonathan D. | Boot-time anti-virus and maintenance facility |
US5559960A (en) * | 1995-04-21 | 1996-09-24 | Lettvin; Jonathan D. | Software anti-virus facility |
US5937157A (en) * | 1995-06-22 | 1999-08-10 | International Business Machines Corporation | Information processing apparatus and a control method |
US5802277A (en) * | 1995-07-31 | 1998-09-01 | International Business Machines Corporation | Virus protection in computer systems |
US5889943A (en) * | 1995-09-26 | 1999-03-30 | Trend Micro Incorporated | Apparatus and method for electronic mail virus detection and elimination |
US5859966A (en) * | 1995-10-10 | 1999-01-12 | Data General Corporation | Security system for computer systems |
US6070239A (en) * | 1995-12-08 | 2000-05-30 | Sun Microsystems, Inc. | System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources |
US6571338B1 (en) * | 1995-12-20 | 2003-05-27 | Sun Microsystems Inc. | Maintaining packet security in a computer network |
US6073239A (en) * | 1995-12-28 | 2000-06-06 | In-Defense, Inc. | Method for protecting executable software programs against infection by software viruses |
US5787169A (en) * | 1995-12-28 | 1998-07-28 | International Business Machines Corp. | Method and apparatus for controlling access to encrypted data files in a computer system |
US5796825A (en) * | 1996-01-16 | 1998-08-18 | Symantec Corporation | System for automatic decryption of file data on a per-use basis and automatic re-encryption within context of multi-threaded operating system under which applications run in real-time |
US5809230A (en) * | 1996-01-16 | 1998-09-15 | Mclellan Software International, Llc | System and method for controlling access to personal computer system resources |
US5919258A (en) * | 1996-02-08 | 1999-07-06 | Hitachi, Ltd. | Security system and method for computers connected to network |
US5931946A (en) * | 1996-02-08 | 1999-08-03 | Hitachi, Ltd. | Network system having external/internal audit system for computer security |
US5761421A (en) * | 1996-03-25 | 1998-06-02 | Sun Microsystems, Inc. | System and method for secure peer-to-peer communication between downloaded programs |
US6366930B1 (en) * | 1996-04-12 | 2002-04-02 | Computer Associates Think, Inc. | Intelligent data inventory & asset management systems method and apparatus |
US6847982B2 (en) * | 1996-04-12 | 2005-01-25 | Computer Associates Think, Inc. | Intelligent data inventory and asset management system method and apparatus |
US5878258A (en) * | 1996-05-06 | 1999-03-02 | Merrill Lynch, Pierce, Fenner & Smith | Seamless application interface manager |
US5884033A (en) * | 1996-05-15 | 1999-03-16 | Spyglass, Inc. | Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering actions |
US6351816B1 (en) * | 1996-05-30 | 2002-02-26 | Sun Microsystems, Inc. | System and method for securing a program's execution in a network environment |
US6263442B1 (en) * | 1996-05-30 | 2001-07-17 | Sun Microsystems, Inc. | System and method for securing a program's execution in a network environment |
US5765204A (en) * | 1996-06-05 | 1998-06-09 | International Business Machines Corporation | Method and apparatus for adaptive localization of frequently accessed, randomly addressed data |
US5825877A (en) * | 1996-06-11 | 1998-10-20 | International Business Machines Corporation | Support for portable trusted software |
US5944821A (en) * | 1996-07-11 | 1999-08-31 | Compaq Computer Corporation | Secure software registration and integrity assessment in a computer system |
US5765030A (en) * | 1996-07-19 | 1998-06-09 | Symantec Corp | Processor emulator module having a variable pre-fetch queue size for program execution |
US5784459A (en) * | 1996-08-15 | 1998-07-21 | International Business Machines Corporation | Method and apparatus for secure, remote swapping of memory resident active entities |
US5867651A (en) * | 1996-08-27 | 1999-02-02 | International Business Machines Corporation | System for providing custom functionality to client systems by redirecting of messages through a user configurable filter network having a plurality of partially interconnected filters |
US5832208A (en) * | 1996-09-05 | 1998-11-03 | Cheyenne Software International Sales Corp. | Anti-virus agent for use with databases and mail servers |
US5892903A (en) * | 1996-09-12 | 1999-04-06 | Internet Security Systems, Inc. | Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system |
US5958050A (en) * | 1996-09-24 | 1999-09-28 | Electric Communities | Trusted delegation system |
US5805829A (en) * | 1996-10-01 | 1998-09-08 | International Business Machines Corp | Process for running applets over non-IP networks |
US5951698A (en) * | 1996-10-02 | 1999-09-14 | Trend Micro, Incorporated | System, apparatus and method for the detection and removal of viruses in macros |
US6804780B1 (en) * | 1996-11-08 | 2004-10-12 | Finjan Software, Ltd. | System and method for protecting a computer and a network from hostile downloadables |
US6802028B1 (en) * | 1996-11-11 | 2004-10-05 | Powerquest Corporation | Computer virus detection and removal |
US5892904A (en) * | 1996-12-06 | 1999-04-06 | Microsoft Corporation | Code certification for network transmission |
US6029145A (en) * | 1997-01-06 | 2000-02-22 | Isogon Corporation | Software license verification process and apparatus |
US5918228A (en) * | 1997-01-28 | 1999-06-29 | International Business Machines Corporation | Method and apparatus for enabling a web server to impersonate a user of a distributed file system to obtain secure access to supported web documents |
US5956481A (en) * | 1997-02-06 | 1999-09-21 | Microsoft Corporation | Method and apparatus for protecting data files on a computer from virus infection |
US5960170A (en) * | 1997-03-18 | 1999-09-28 | Trend Micro, Inc. | Event triggered iterative virus detection |
US5974549A (en) * | 1997-03-27 | 1999-10-26 | Soliton Ltd. | Security monitor |
US6766454B1 (en) * | 1997-04-08 | 2004-07-20 | Visto Corporation | System and method for using an authentication applet to identify and authenticate a user in a computer network |
US5964889A (en) * | 1997-04-16 | 1999-10-12 | Symantec Corporation | Method to analyze a program for presence of computer viruses by examining the opcode for faults before emulating instruction in emulator |
US6108786A (en) * | 1997-04-25 | 2000-08-22 | Intel Corporation | Monitor network bindings for computer security |
US5961644A (en) * | 1997-09-19 | 1999-10-05 | International Business Machines Corporation | Method and apparatus for testing the integrity of computer security alarm systems |
US6185678B1 (en) * | 1997-10-02 | 2001-02-06 | Trustees Of The University Of Pennsylvania | Secure and reliable bootstrap architecture |
US6014666A (en) * | 1997-10-28 | 2000-01-11 | Microsoft Corporation | Declarative and programmatic access control of component-based server applications using roles |
US6070244A (en) * | 1997-11-10 | 2000-05-30 | The Chase Manhattan Bank | Computer network security management system |
US6282709B1 (en) * | 1997-11-12 | 2001-08-28 | Philips Electronics North America Corporation | Software update manager |
US6088679A (en) * | 1997-12-01 | 2000-07-11 | The United States Of America As Represented By The Secretary Of Commerce | Workflow management employing role-based access control |
US6535855B1 (en) * | 1997-12-09 | 2003-03-18 | The Chase Manhattan Bank | Push banking system and method |
US6088803A (en) * | 1997-12-30 | 2000-07-11 | Intel Corporation | System for virus-checking network data during download to a client device |
US6205551B1 (en) * | 1998-01-29 | 2001-03-20 | Lucent Technologies Inc. | Computer security using virus probing |
US7363655B2 (en) * | 1998-02-12 | 2008-04-22 | Auctnyc 8 Llc | Computer virus screening methods and systems |
US7185332B1 (en) * | 1998-03-25 | 2007-02-27 | Symantec Corporation | Multi-tiered incremental software updating |
US6298445B1 (en) * | 1998-04-30 | 2001-10-02 | Netect, Ltd. | Computer security |
US6080207A (en) * | 1998-06-04 | 2000-06-27 | Gateway 2000, Inc. | System and method of creating and delivering software |
US6505300B2 (en) * | 1998-06-12 | 2003-01-07 | Microsoft Corporation | Method and system for secure running of untrusted content |
US6185689B1 (en) * | 1998-06-24 | 2001-02-06 | Richard S. Carson & Assoc., Inc. | Method for network self security assessment |
US6389539B1 (en) * | 1998-09-30 | 2002-05-14 | International Business Machines Corporation | Method and system for enhancing security access to a data processing system |
US6381602B1 (en) * | 1999-01-26 | 2002-04-30 | Microsoft Corporation | Enforcing access control on resources at a location other than the source location |
US7263718B2 (en) * | 1999-02-09 | 2007-08-28 | Secure Computing Corporation | Security framework for supporting kernel-based hypervisors within a computing system |
US6405318B1 (en) * | 1999-03-12 | 2002-06-11 | Psionic Software, Inc. | Intrusion detection system |
US7240368B1 (en) * | 1999-04-14 | 2007-07-03 | Verizon Corporate Services Group Inc. | Intrusion and misuse deterrence system employing a virtual network |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080320586A1 (en) * | 2001-01-25 | 2008-12-25 | Solutionary, Inc. | Security system for a computer network having a security subsystem and a master system which monitors the integrity of a security subsystem |
US8261347B2 (en) * | 2001-01-25 | 2012-09-04 | Solutionary, Inc. | Security system for a computer network having a security subsystem and a master system which monitors the integrity of a security subsystem |
US8931077B2 (en) | 2001-01-25 | 2015-01-06 | Solutionary, Inc. | Security system for a computer network having a security subsystem and a master system which monitors the integrity of a security subsystem |
US20080022401A1 (en) * | 2006-07-21 | 2008-01-24 | Sensory Networks Inc. | Apparatus and Method for Multicore Network Security Processing |
US20080141377A1 (en) * | 2006-12-07 | 2008-06-12 | Microsoft Corporation | Strategies for Investigating and Mitigating Vulnerabilities Caused by the Acquisition of Credentials |
US8380841B2 (en) * | 2006-12-07 | 2013-02-19 | Microsoft Corporation | Strategies for investigating and mitigating vulnerabilities caused by the acquisition of credentials |
US20090150971A1 (en) * | 2007-12-07 | 2009-06-11 | Srinivas Vedula | Techniques for dynamic generation and management of password dictionaries |
US8286000B2 (en) * | 2007-12-07 | 2012-10-09 | Novell, Inc. | Techniques for dynamic generation and management of password dictionaries |
US9032216B2 (en) | 2007-12-07 | 2015-05-12 | Apple Inc. | Techniques for dynamic generation and management of password dictionaries |
Also Published As
Publication number | Publication date |
---|---|
AU4568299A (en) | 2000-01-05 |
WO1999066383A2 (en) | 1999-12-23 |
US20020026591A1 (en) | 2002-02-28 |
US6889168B2 (en) | 2005-05-03 |
WO1999066383A3 (en) | 2000-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6889168B2 (en) | Method and apparatus for assessing the security of a computer system | |
Ilgun et al. | State transition analysis: A rule-based intrusion detection approach | |
US8639896B2 (en) | Locating and altering sensitive information in core dumps | |
EP2071504B1 (en) | Sensitive information management | |
US6560776B1 (en) | Software installation verification tool | |
US6009475A (en) | Filter rule validation and administration for firewalls | |
KR100781730B1 (en) | System and method for electronically managing composite documents | |
CN111695156A (en) | Service platform access method, device, equipment and storage medium | |
JP3744361B2 (en) | Security management system | |
US5579478A (en) | System administration module for an operating system affords graded restricted access privileges | |
US8819639B2 (en) | System for selectively blocking execution of applications on a computer system | |
JP5730347B2 (en) | Computer system management program and computer | |
US6966052B1 (en) | Method and apparatus for top-down testing based on end user documentation | |
US20070079364A1 (en) | Directory-secured packages for authentication of software installation | |
CN117150453B (en) | Network application detection method, device, equipment, storage medium and program product | |
Cisco | Cisco Intrusion Detection System Host Sensor Quick Start | |
Cisco | Initial Installation | |
Bui et al. | Issues in computer forensics | |
JP4357614B2 (en) | Log management system | |
CN118708114B (en) | Access control method, device, electronic device and storage medium for storage peripherals | |
JP4044973B2 (en) | Security management method and security management apparatus | |
Schwittay | Towards automating analysis in computer forensics | |
GB2388212A (en) | Improvements relating to software configuration management systems | |
Buurman | Xperteyes-keeping your system under control | |
Sisson et al. | SPAN security policies and guidelines |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ENTERPRISE INFORMATION MANAGEMENT, INC., COLORADO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INNERWALL, INC.;REEL/FRAME:028466/0072 Effective date: 20101215 |
|
AS | Assignment |
Owner name: DMW WORLDWIDE, INC., COLORADO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HARTLEY, BRUCE V.;KNIGHT, ERIC;ZYMBALUK, GREG;AND OTHERS;REEL/FRAME:030741/0855 Effective date: 19990820 Owner name: TVIIM, LLC, COLORADO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ENTERPRISE INFORMATION MANAGEMENT, INC.;REEL/FRAME:030741/0913 Effective date: 20130131 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |