(12) United States Patent ao) Patent No.: us 6,889,168 B2
Hartley et al. (45) Date of Patent: May 3,2005
(54) METHOD AND APPARATUS FOR ASSESSING THE SECURITY OF A COMPUTER SYSTEM
(75) Inventors: Bruce V. Hartley, Elbert, CO (US);
Eric Knight, Pueblo West, CO (US);
Greg Zymbaluk, Colorado Springs, CO
(US); Cynthia Mavros, Palmer Lake,
CO (US); Kevin Reynolds, Pueblo, CO
(73) Assignee: Innerwall, Inc., Colorado Springs, CO (US)
( * ) Notice: Subject to any disclaimer, the term of this patent is extended or adjusted under 35 U.S.C. 154(b) by 483 days.
(21) Appl. No.: 09/834,334
(22) Filed: Apr. 12, 2001
(65) Prior Publication Data
US 2002/0026591 Al Feb. 28, 2002
Related U.S. Application Data
(63) Continuation of application No. 09/333,547, filed on Jun.
15, 1999, now abandoned. (60) Provisional application No. 60/091,270, filed on Jun. 15,
(51) Int. CI.7 G06F 12/14
(52) U.S. CI 702/186; 713/201
(58) Field of Search 713/200-202;
(56) References Cited
U.S. PATENT DOCUMENTS
5,892,943 A 4/1999 Klaus
5,961,644 A 10/1999 Kurtzberg et al.
Network Assocates launches CyberCop-Network Intrusion Detection Technology, unattributed, Downloaded from:
plate.asp?PR=/PressMedia/021798b.as. . . pp. 1 & 2.
What Satan Is, Extract from a USENET posting date 1995, p. 1. Downloaded from www.fish.com/security. Designing and Attacking Port Scan Detection Tools, Phwack Magazine, Author "Solar Designer" firstname.lastname@example.org (assumed anonymous) vol. 8, issue 53, pps. 1-11.
Titan, Farmer et al., Improving the Security of you Site by Breaking into It. Downloaded from: www.fish.com/security/ admin-guide-to-cracking.html, pp. 1-18.
The Ins and Outs of a Network Security Audit, Info World Media Group Inc. 1998, unattributed, pp. 1-3. Downloaded from www.fish.com/titan/lisa-paper.html, pps. 1-12.
Farmer et al., Downloaded from www.fish.com/titan/lisapaper.html, pps. 1-12.
O'Neil et al., Test Center Comparison, InfoWorld.com, vol. 21, issue 6, pps 1-18.
CyberCop Screen Shot, unattributed. www.softsource.com, pps 1 & 2.
Security, unattributed, www.fish.com/security. Internet Document.
Primary Examiner—Patrick Assouad
Assistant Examiner—Craig Steven Miller
(74) Attorney, Agent, or Firm—Lathrop & Gage LC
A method and apparatus performs a security analysis computer system to identify, notify, and possibly correct, vulnerabilities and discrepancies. The security system includes a number of security tools and utilities in order to perform these functions. The security system includes the capability to identify the system configuration and once this is done performs different processes to analyze the computer system directories, locate vulnerabilities in the files or directories, check the network access, do analysis of the users or groups which have access to the computer system and check the permissions which these parties have been granted, and analyze passwords of the users. The utilities include the functionality to permanently remove files from the computer system, mark particular files to be analyzed, as well as schedule the security tests to be performed at predetermined times.
20 Claims, 15 Drawing Sheets