MY191638A - System and method for performing vulnerability assessment of a computer network - Google Patents
System and method for performing vulnerability assessment of a computer networkInfo
- Publication number
- MY191638A MY191638A MYPI2018001552A MYPI2018001552A MY191638A MY 191638 A MY191638 A MY 191638A MY PI2018001552 A MYPI2018001552 A MY PI2018001552A MY PI2018001552 A MYPI2018001552 A MY PI2018001552A MY 191638 A MY191638 A MY 191638A
- Authority
- MY
- Malaysia
- Prior art keywords
- vulnerability
- detected
- scanning task
- repeated scanning
- data
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer And Data Communications (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides a system and method for performing vulnerability assessment of a distributed computing network. The system and method may involve extracting vulnerability data from scan results generated by each computer accessible via the network, and then using the extracted vulnerability data to determine if each vulnerability is previously detected. If a vulnerability is previously detected, historical data relating to such vulnerability are retrieved from a database (209), in which the historical data are used to identify whether the vulnerability is detected in a repeated scanning task. The vulnerability data is also analysed if the vulnerability detected in the repeated scanning task still remains unresolved. A penalty will be assigned to the vulnerability that remains unresolved in the repeated scanning task. On the contrary, a time for resolving the vulnerability is computed if it is not previously detected or if it is not detected in the repeated scanning task. (Figure 1)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2018001552A MY191638A (en) | 2018-09-13 | 2018-09-13 | System and method for performing vulnerability assessment of a computer network |
PCT/MY2019/050054 WO2020055230A1 (en) | 2018-09-13 | 2019-09-12 | System and method for performing vulnerability assessment of a computer network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2018001552A MY191638A (en) | 2018-09-13 | 2018-09-13 | System and method for performing vulnerability assessment of a computer network |
Publications (1)
Publication Number | Publication Date |
---|---|
MY191638A true MY191638A (en) | 2022-07-05 |
Family
ID=69778224
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MYPI2018001552A MY191638A (en) | 2018-09-13 | 2018-09-13 | System and method for performing vulnerability assessment of a computer network |
Country Status (2)
Country | Link |
---|---|
MY (1) | MY191638A (en) |
WO (1) | WO2020055230A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113609491B (en) * | 2021-08-02 | 2024-01-26 | 中通服咨询设计研究院有限公司 | Plug-in vulnerability automatic scanning method based on message queue |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7451488B2 (en) * | 2003-04-29 | 2008-11-11 | Securify, Inc. | Policy-based vulnerability assessment |
JP2009237807A (en) * | 2008-03-26 | 2009-10-15 | Nippon Telegr & Teleph Corp <Ntt> | Vulnerability diagnosis conducting apparatus and diagnostic schedule generating program |
US8789190B2 (en) * | 2011-12-23 | 2014-07-22 | Mcafee, Inc. | System and method for scanning for computer vulnerabilities in a network environment |
US9507943B1 (en) * | 2013-02-19 | 2016-11-29 | Amazon Technologies, Inc. | Analysis tool for data security |
US9977905B2 (en) * | 2015-10-06 | 2018-05-22 | Assured Enterprises, Inc. | Method and system for identification of security vulnerabilities |
-
2018
- 2018-09-13 MY MYPI2018001552A patent/MY191638A/en unknown
-
2019
- 2019-09-12 WO PCT/MY2019/050054 patent/WO2020055230A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2020055230A1 (en) | 2020-03-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019083737A8 (en) | System and method for analyzing binary code for malware classification using artificial neural network techniques | |
CN108900514B (en) | Attack information tracking and tracing method and device based on homologous analysis | |
EA201890935A1 (en) | METHOD OF OBTAINING AND ANALYSIS OF AEROPHOTIC IMPACT | |
MY181403A (en) | Systems and method for providing information for an on-demand service | |
MY191732A (en) | Computer implemented system for generating assurance related planning process and documents for an entity and method thereof | |
US11620474B2 (en) | Model reselection for accommodating unsatisfactory training data | |
GB2581762A (en) | Data de-identification based on detection of allowable configurations for data de-identification processes | |
SG11201907703UA (en) | Method, device and computer program for analyzing data | |
MY191557A (en) | Management server and management method employing same | |
JP2014178907A5 (en) | ||
US11487882B2 (en) | Vulnerability influence evaluation system | |
WO2018231671A3 (en) | Suspicious remittance detection through financial behavior analysis | |
US10496818B2 (en) | Systems and methods for software security scanning employing a scan quality index | |
KR20210073895A (en) | System for predicting risk of worker reflecting field conditions and previous accident cases and method thereof | |
MX2020002093A (en) | Genealogical entity resolution system and method. | |
EA202192620A1 (en) | DYNAMIC VIRTUAL COPIES OF PRODUCTION FACILITIES | |
MY191638A (en) | System and method for performing vulnerability assessment of a computer network | |
US9396177B1 (en) | Systems and methods for document tracking using elastic graph-based hierarchical analysis | |
CN112732693B (en) | Intelligent internet of things data acquisition method, device, equipment and storage medium | |
KR20180060616A (en) | RBA based integrated weak point diagnosis method | |
US20170276567A1 (en) | Information processing apparatus, information processing method, and program | |
SG11201900254RA (en) | Information retrieval precision evaluation method, system and device and computer-readable storage medium | |
CN109325348B (en) | Application security analysis method and device, computing equipment and computer storage medium | |
CN107203720B (en) | Risk value calculation method and device | |
CN113657808B (en) | Personnel assessment method, device, equipment and storage medium |