Robert E. Gleichauf - San Antonio TX Gerald S Lathem - Elgin TX Scott V. Waddell - Austin TX
Assignee:
Cisco Technology, Inc. - San Jose CA
International Classification:
G06F 1300
US Classification:
709224
Abstract:
A method and system for mapping a network domain provides a centralized repository for network information to support network devices, including an intrusion detection system. A domain mapping device includes an acquisition engine for acquiring network information, hypercube storage for storing network information, and a query engine for responding to queries from network devices for network information. The acquisition engine acquires network information by active scanning of network devices, passive scanning of network devices, polling of network devices, or receiving network information pushed from network devices. The network information includes device type, operating system, service and vulnerability information. The query engine provides network information in response to queries from network devices, such as intrusion detection devices that use the data to detect attacks on the vulnerabilities of the network.
Method And System For Mapping A Network For System Security
Robert E. Gleichauf - San Antonio TX, US Gerald Lathem - Elgin TX, US Scott V. Waddell - Austin TX, US
Assignee:
Cisco Technology, Inc. - San Jose CA
International Classification:
G06F013/00
US Classification:
709224
Abstract:
A method and system for mapping a network domain provides a centralized repository for network information to support network devices, including an intrusion detection system. A domain mapping device includes an acquisition engine for acquiring network information, hypercube storage for storing network information, and a query engine for responding to queries from network devices for network information. The acquisition engine acquires network information by active scanning of network devices, passive scanning of network devices, polling of network devices, or receiving network information pushed from network devices. The network information includes device type, operating system, service and vulnerability information. The query engine provides network information in response to queries from network devices, such as intrusion detection devices that use the data to detect attacks on the vulnerabilities of the network.
A technique where mobile devices can receive configuration settings tailored to a situation to avoid embarrassing disruptions of meetings and other events through a Mobile Device Situational Awareness Protocol (MDSAP). The MDSAP could also provide location-specific information to the mobile devices that would include presentations and multimedia files or maps and other physical location detail that could be useful in emergencies.
System And Method For Evaluating Risk In Fraud Prevention
Jim Newman - Portland OR, US Bart Lonchar - Portland OR, US Scott Waddell - Lake Oswego OR, US
International Classification:
G06Q 40/02
US Classification:
705 35
Abstract:
A method of determining a risk score indicating a risk that an electronic transaction will involve fraud and/or abuse. The method includes receiving transaction data associated with a not yet completed transaction from a merchant. The transaction data includes one or more characteristics related to the transaction. A profile is selected that identifies network devices each associated with the characteristics and having a device reputation. Next, a profile-based risk factor is determined as a function of a percentage of the network devices having a negative reputation. The risk score is determined as a function of the profile-based risk factor. In some embodiments, a transaction-based risk factor may also be determined. In such embodiments, the risk score is determined as a function of the profile-based and transaction-based risk factors. The risk score is provided to the merchant to be used thereby to determine whether to proceed with the transaction.
System And Method For Rules-Driven Multi-Phase Network Vulnerability Assessment
Robert Gleichauf - San Antonio TX Steven Shanklin - San Antonio TX Scott Waddell - San Antonio TX Kevin Ziese - Converse TX
Assignee:
Cisco Technology, Inc. - San Jose CA
International Classification:
G06F 1100
US Classification:
714 37
Abstract:
In one aspect of the invention, a computer implemented method for rules-driven multi-phase network vulnerability assessment is disclosed. The method comprises pinging devices on a network to discover devices with a connection to the network. Port scans are performed on the discovered devices and banners are collected. Information from the collected banners are stored as entries in a first database. Analysis is performed on the entries by comparing the entries with a rule set to determine potential vulnerabilities. The results of the analysis are stored in a second database.
Method And System For Adaptive Network Security Using Network Vulnerability Assessment
Robert E. Gleichauf - San Antonio TX William A. Randall - Austin TX Daniel M. Teal - San Antonio TX Scott V. Waddell - Austin TX Kevin J. Ziese - Dripping Springs TX
Assignee:
Cisco Technology, Inc. - San Jose CA
International Classification:
G06F 1130
US Classification:
713201
Abstract:
A method and system for adaptive network security using network vulnerability assessment is disclosed. The method comprises directing a request onto a network. A response to the request is assessed to discover network information. A plurality of analysis tasks are prioritized based upon the network information. The plurality of analysis tasks are to be performed on monitored network data traffic in order to identify attacks upon the network.
Richardson, TXOwner at G Scott Waddell Company Established in 1982 in Dallas, Texas, G. Scott Waddell Company represents manufacturers of contract furniture for commercial, medical, educational, and... Established in 1982 in Dallas, Texas, G. Scott Waddell Company represents manufacturers of contract furniture for commercial, medical, educational, and hospitality projects. G. Scott Waddell Company offers standard products however we specialize in custom products that are designed to make a...