Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment
Reexamination Certificate
2007-10-02
2007-10-02
Zand, Kambiz (Department: 2134)
Information security
Monitoring or scanning of software or data including attack...
Vulnerability assessment
C713S159000, C713S185000, C705S038000, C705S004000, C705S007380, C717S173000
Reexamination Certificate
active
11062409
ABSTRACT:
A system and method for assessing risks to computer network is provided. The system includes a first module assesses a human factor related to a risk to the computer network. A second module assesses a remediation to the computer network, and a third module is operable to assess a life cycle of an asset on the computer network. A fourth module assesses a type of the asset used by the computer network.
REFERENCES:
patent: 5237614 (1993-08-01), Weiss
patent: 5931946 (1999-08-01), Terada et al.
patent: 5987611 (1999-11-01), Freund
patent: 6064972 (2000-05-01), Jankowitz et al.
patent: 6298445 (2001-10-01), Shostack et al.
patent: 6324656 (2001-11-01), Gleichauf et al.
patent: 6334190 (2001-12-01), Silverbrook et al.
patent: 6493871 (2002-12-01), McGuire et al.
patent: 6766458 (2004-07-01), Harris et al.
patent: 2002/0026591 (2002-02-01), Hartley et al.
patent: 2002/0087882 (2002-07-01), Schneier et al.
patent: 2002/0138271 (2002-09-01), Shaw
patent: 2002/0147803 (2002-10-01), Dodd et al.
patent: 2002/0188481 (2002-12-01), Berg et al.
patent: 2003/0056113 (2003-03-01), Korosec
patent: 2003/0126472 (2003-07-01), Banzhof
patent: 2003/0135749 (2003-07-01), Gales et al.
patent: 2003/0140250 (2003-07-01), Taninaka et al.
patent: 2003/0196097 (2003-10-01), Korosec et al.
patent: 2003/0233438 (2003-12-01), Hutchinson et al.
patent: 2004/0010709 (2004-01-01), Baudoin et al.
patent: 2004/0019803 (2004-01-01), Jahn
patent: 2004/0143753 (2004-07-01), Hernacki et al.
patent: 2004/0170153 (2004-09-01), Stewart et al.
patent: 2005/0010821 (2005-01-01), Cooper et al.
patent: 2005/0044037 (2005-02-01), Lawrence et al.
Carl E. Banzof, et al., Inventory Management-Based Computer Vulnerability Resolution System, Filing Date—Oct. 28, 2004, U.S. Appl. No. 10/975,828, Specification (72 pgs.), Drawings (8 sheets).
Carl E. Banzhof, et al., Method and Apparatus for Protecting a Remediated Computer Network From Entry of a Vulnerable Computer System Thereinto, Filing Date—Mar. 25, 2004, U.S. Appl. No. 10/810,927, Specification (51 pgs.), Drawings (6 sheets).
CERT® Advisories, “CERT/CC Adivisories 1988-2000,” http://web.archive.org/web/20000815055129/http://www.cert.org/advisories/, 2000, 34 pgs.
Products Overview, Network Security Solutions—Improve the Security of Your Network with Foundstone, Inc., http://www.foundstone.com/products/overview.htm, 2 pgs.
International Search Report and Written Opinion of the International Search Authority, International Appl. No. PCT/US2006/055110, Jan. 26, 2007.
Banzhof Carl E.
Davies John
Conley & Rose, P.C.
Gee Jason
McAfee, Inc.
Zand Kambiz
LandOfFree
Security risk analysis system and method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Security risk analysis system and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security risk analysis system and method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3900931