Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment
Reexamination Certificate
2004-11-23
2009-02-24
Smithers, Matthew B (Department: 2437)
Information security
Monitoring or scanning of software or data including attack...
Vulnerability assessment
C726S022000, C705S038000
Reexamination Certificate
active
07496964
ABSTRACT:
A method for automated risk management may include presenting a rule request graphical user interface (GUI) for a requester to enter information related to a rule request for a rule. The method may also include determining a risk rating score for the rule based on information entered in the rule request GUI. The information may include at least one of source information, destination information, service information and port information.
REFERENCES:
patent: 2004/0024693 (2004-02-01), Lawrence
patent: 2004/0267660 (2004-12-01), Greenwood et al.
patent: 2005/0262544 (2005-11-01), Brooks et al.
patent: 2006/0015934 (2006-01-01), Wool
patent: WO 0180043 (2001-10-01), None
Fussell, L.; Field, S; “The role of the risk management database in the risk management process” Systems Engineering, 2005 ICSEng 2005. 18th International Conference on Aug. 16-18, 2005 pp. 364-369.
Barve Ajay
Murray Christina
Renfro Chad
Sankaran Arun
Bank of America Corporation
Fields Courtney D
Moore Charles L.
Moore & Van Allen PLLC
Smithers Matthew B
LandOfFree
Method and system for automated risk management of... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for automated risk management of..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for automated risk management of... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4117353