Claims
- 1. A software tool for assessing network security, comprising:
a first module, for receiving network characterization information from a customer; a second module, for determining if said network characterization information has associated with it a network security vulnerability; and a third module, for generating security recommendations based upon any determined network security vulnerabilities.
- 2. The tool of claim 1, further comprising:
a fourth module, for generating a customer qualification form using qualification questions stored within a first database, said network characterization information including customer responses to said qualification questions.
- 3. The tool of claim 2, wherein:
said fourth module, in response to said customer responses to said qualification questions, generating a customized questionnaire using at least some of a plurality of survey questions stored within a second database; said network characterization information including customer responses to said survey questions.
- 4. The tool of claim 3, further comprising:
a fifth module, for executing selected network testing procedures in response to customer question responses indicative of a vulnerability.
- 5. The tool of claim 1, wherein:
said second module analyzing a network and its elements to determine additional vulnerabilities, mapping a network architecture, and providing an inventory of network elements; said third module generating additional security recommendations based upon any additional vulnerabilities.
- 6. The tool of claim 1, wherein:
said third module compares said network characterization information to information within a vulnerability database to identify network security vulnerabilities.
- 7. The tool of claim 6, wherein:
said vulnerability database specifies network security vulnerabilities according to a vulnerabilities and exposure (CVE) dictionary.
- 8. The tool of claim 6, wherein:
said vulnerability database comprises at least one of a publicly available vulnerability database and a local database.
- 9. The tool of claim 8, wherein:
said publicly available vulnerability database comprises at least one of the ICAT Metabase the CERT database.
- 10. The tool of claim 7, wherein:
said vulnerability database associates each specified network security vulnerability with at least one corresponding security recommendation; said fourth module retrieving from said vulnerability database said security recommendations corresponding to identified network security vulnerabilities.
- 11. The tool of claim 1, wherein:
said third module generates a security rating.
- 12. The tool of claim 1, wherein:
said third module generates a security analysis table for correlating security threats, security mechanisms, security planes, and security layers.
- 13. The tool of claim 1, wherein:
a network security model is used to adapt the operation of at least the second and third modules.
- 14. The tool of claim 13, wherein:
said network security model classifies the functions of each of a plurality of network elements, protocols and services according to respective ones of a plurality of security layers, each of said security layers responsive to at least one of a plurality of security mechanisms adapted to mitigate network security threats; said network model associates each classified function with at least one of a plurality of security planes, each of said plurality of security planes included within each of said plurality of security layers; said network model enables identifying of the vulnerability of each function for each security layer and security plane associated with said function.
- 15. The tool of claim 4, wherein:
said third module generated a report listing security vulnerabilities determined in response to customer input and during the execution of said selected network testing procedures.
- 16. The tool of claim 15, wherein:
said report includes security recommendations derived from a vulnerability database that specifies network security vulnerabilities according to a vulnerabilities and exposure (CVE) dictionary.
- 17. The tool of claim 4, wherein:
said selected network testing procedures are configured in response to customer responses to at least one of said customer qualification form and said customized questionnaire.
- 18. The tool of claim 1, wherein:
said third module generates a security assessment indicative of a percentage compliance with group of best practices.
- 19. The tool of claim 1, wherein:
said customer interacts with said tool and receives said security recommendations via a common interface.
- 20. A method, comprising:
classifying the functions of each of a plurality of network elements, protocols and services according to respective ones of a plurality of security layers; associating each classified function with at least one of a plurality of security planes, each of said plurality of security planes included within each of said plurality of security layers; identifying the vulnerability of each function for each security layer and security plane associated with said function; and providing a recommendation adapted to mitigate any identified vulnerabilities.
- 21. The method of claim 20, wherein:
each of said security mechanisms is adapted to mitigate at least one of a network element vulnerability, a protocol vulnerability, a service vulnerability and a network security threat.
- 22. The method of claim 20, wherein:
said security layers comprise at least two of an infrastructure security layer, a services security layer and an applications security layer; said infrastructure security layer adapted to secure individual network elements and individual transmission links; said services security layer adapted to secure network services; and said applications security layer adapted to secure network-based applications.
- 23. The method of claim 20, wherein:
each of a plurality of security layers are responsive to at least one of a plurality of security mechanisms, each of said service mechanisms adapted to mitigate at least one of a network element vulnerability, a protocol vulnerability, a service vulnerability and a network security threat, said method further comprising:
identifying the vulnerability of each function for each security layer and security plane associated with said function; and providing a recommendation adapted to mitigate any identified vulnerabilities by using at least one of said security mechanisms for network elements within one or more security planes.
- 24. The method of claim 20, wherein said security layers comprise at least two of an infrastructure security layer, a services security layer and an applications security layer.
- 25. The method of claim 20, further comprising:
generating a security analysis table, said security analysis table directed toward end-to-end network security by correlating Security Threats, Security Mechanisms, Security Planes, and Security Layers.
- 26. A computer readable medium containing instructions which, when executed by a processor, perform a process for assessing network security, comprising:
means for receiving network characterization information from a customer; means determining if said network characterization information has associated with it a network security vulnerability; and means for generating security recommendations based upon any determined network security vulnerabilities.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This application claims the benefit of commonly owned provisional patent application Serial No. 60/349,947, filed Jan. 18, 2002, which is hereby incorporated by reference in its entirety.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60349947 |
Jan 2002 |
US |