International Business Machines Corporation
Vulnerability scanner based on network profile
Last updated:
Abstract:
An approach is provided for vulnerability scanning that receives network access data from a secure network connection and stores the data in a memory. The set of network access data pertain to a set of network accessible resources. The set of network accessible resources are then accessed using the set of received network access data. A vulnerability scan is performed of the network accessible resources after which the access to the set of network accessible resources is released and the set of network access data is deleted from the memory.
Status:
Grant
Type:
Utility
Filling date:
31 Jul 2019
Issue date:
7 Dec 2021