Claims
- 1. A graphical user interface contained on a computer screen and used for determining the security posture of a network comprising:a system design window for displaying network icons of a network map that are representative of different network elements contained within a network, wherein respective network icons are linked together in an arrangement corresponding to how network elements are interconnected within the network; wherein selected portions of the network map turn a different color indicative of a vulnerability that has been established for that portion of the network after a security posture of the network has been established by correlating a system object model database that supports information data requirements of disparate network vulnerability analysis programs with any data results obtained from the programs.
- 2. A graphical user interface according to claim 1, wherein respective network elements turn a different color indicative of a vulnerable network node.
- 3. A graphical user interface according to claim 1, and further comprising a manager window for displaying properties of network elements.
- 4. A graphical user interface according to claim 1, wherein icons are linked together by arrows that turn a different color indicative of a vulnerable connection that exists between network elements.
- 5. A graphical user interface contained on a computer screen and used for determining the security posture of a network comprising:a system design window for displaying icons of a network map that are representative of different network nodes contained within a network, wherein respective icons are linked together in an arrangement corresponding to how network nodes are interconnected within the network; a manager window on which respective properties of network nodes are displayed and edited; wherein selected icons turn the color red indicative of a higher risk node and selected icons turn yellow indicative of a less severe risk node after a vulnerability posture of the network has been established by correlating a system object model database that supports information data. requirements of disparate network vulnerability analysis programs with any data results obtained from the programs.
- 6. A graphical user interface according to claim 5, wherein said manager window further comprises a node properties display box for editing the properties of network nodes for network design alternatives.
- 7. A graphical user interface according to claim 5, and further comprising a data sensitivity box having user selected items for selecting the sensitivity of network nodes.
- 8. A graphical user interface according to claim 5, and further comprising a select node configuration edit box having a user selectable vulnerability profile for selecting a vulnerability of a respective node.
- 9. A graphical user interface contained on a computer screen and used for determining the security posture of a network comprising:a system design window for displaying network icons of a network map that are representative of different network elements contained within a network, wherein respective network icons are linked together in an arrangement corresponding to how network elements are interconnected within the network, wherein selected portions of the network map turn a different color indicative of a vulnerability that has been established for that portion of the network after a security posture of the network has been established by correlating a system object model database that supports information data requirements of disparate network vulnerability analysis programs with any data results obtained from the programs; and a vulnerability posture window for displaying user readable items indicative of vulnerable network elements.
- 10. A graphical user interface according to claim 9, wherein said user readable items comprise a chart indicative of vulnerable network elements.
- 11. A graphical user interface according to claim 9, wherein said user readable items comprise a spreadsheet indicating the vulnerable network elements.
- 12. A graphical user interface according to claim 9, wherein respective network elements represented by icons turn a different color indicative of a vulnerable network node.
- 13. A graphical user interface according to claim 9, and further comprising a manager window for displaying properties of network elements.
- 14. A graphical user interface according to claim 9, and further comprising a data sensitivity box having user selected items for selecting the sensitivity of network elements.
- 15. A graphical user interface according to claim 9, and further comprising a select node configuration edit box having a user selectable vulnerability profile for a network node.
- 16. A graphical user interface according to claim 9, wherein icons are linked together by arrows that turn a different color indicative of a vulnerable connection that exists between network elements.
- 17. A graphical user interface contained on a computer screen and used for determining the security posture of a network comprising:a system design window for displaying icons of a network map that are representative of different network nodes contained within a network, wherein respective icons are linked together in an arrangement corresponding to how the network nodes are interconnected within the network; a manager window on which respective properties of network nodes are displayed and edited; wherein selected icons turn the color red indicative of a higher risk node and selected icons turn yellow indicative of a less severe risk node after a security posture of the network has been established by correlating a system object model database that supports information data requirements of disparate network vulnerability analysis programs, with any data results obtained from the programs; and a vulnerability posture window for displaying user readable items indicative of vulnerable network icons.
- 18. A graphical user interface according to claim 17, wherein said user readable items comprise a chart indicative of vulnerable network nodes.
- 19. A graphical user interface according to claim 17, wherein said user readable items comprise a spreadsheet indicating the vulnerable network nodes.
- 20. A graphical user interface according to claim 17, wherein said manager window further comprises a node properties display box for editing the properties of network nodes for network design alternatives.
- 21. A graphical user interface according to claim 17, and further comprising a data sensitivity box having user selected items for selecting the sensitivity of data respective nodes.
- 22. A graphical user interface according to claim 17, and further comprising a select node configuration edit box having a user selectable vulnerability profile for a respective node.
- 23. A graphical user interface contained on a computer screen and used for determining the security posture of a network comprising:a system design window for displaying network icons of a network map that are representative of different network elements contained within a network, wherein respective network icons are linked together in an arrangement corresponding to how network elements are interconnected within the network and a data sensitivity box having user selected items for selecting the sensitivity of network elements; wherein selected portions of the network map turn a different color indicative of a vulnerability that has been established for that portion of the network after a security posture of the network has been established.
- 24. A graphical user interface contained on a computer screen and used for determining the security posture of a network comprising:a system design window for displaying network icons of a network map that are representative of different network elements contained within a network, wherein respective network icons are linked together in an arrangement corresponding to how network elements are interconnected within the network and a select node configuration edit box having a user selectable vulnerability profile for selecting a vulnerability profile of a network node; wherein selected portions of the network map turn a different color indicative of a vulnerability that has been established for that portion of the network after a security posture of the network has been established.
Government Interests
This invention was made with Government support under Contract No. F30602-96-C-0289 awarded by the United States Air Force. The Government has certain rights in this invention.
US Referenced Citations (17)
Foreign Referenced Citations (2)
Number |
Date |
Country |
0 961 440 |
Dec 1999 |
EP |
WO 9956195 |
Nov 1999 |
WO |