Abstract: A network edge device configured to perform a method for controlling access to services in a network, the network including at least one device configured to provide a service, the service being associated with a port is provided. The method involves performing a port identification scan on the network to generate port data representing the service and the port; obtaining port vulnerability data; generating a port vulnerability score for the port based on the port data and the port vulnerability data; obtaining a threshold port vulnerability score; and controlling access to the port in dependence on a comparison of the port vulnerability score with the threshold port vulnerability score.
Description:PLEASE SEE ATTACHED , Claims:PLEASE SEE ATTACHED
| # | Name | Date |
|---|---|---|
| 1 | 202341039377-STATEMENT OF UNDERTAKING (FORM 3) [08-06-2023(online)].pdf | 2023-06-08 |
| 2 | 202341039377-FORM 1 [08-06-2023(online)].pdf | 2023-06-08 |
| 3 | 202341039377-DRAWINGS [08-06-2023(online)].pdf | 2023-06-08 |
| 4 | 202341039377-DECLARATION OF INVENTORSHIP (FORM 5) [08-06-2023(online)].pdf | 2023-06-08 |
| 5 | 202341039377-COMPLETE SPECIFICATION [08-06-2023(online)].pdf | 2023-06-08 |
| 6 | 202341039377-Proof of Right [25-10-2023(online)].pdf | 2023-10-25 |
| 7 | 202341039377-Power of Attorney [16-11-2023(online)].pdf | 2023-11-16 |
| 8 | 202341039377-FORM-26 [16-11-2023(online)].pdf | 2023-11-16 |
| 9 | 202341039377-Form 1 (Submitted on date of filing) [16-11-2023(online)].pdf | 2023-11-16 |
| 10 | 202341039377-Covering Letter [16-11-2023(online)].pdf | 2023-11-16 |
| 11 | 202341039377-FORM 3 [31-05-2024(online)].pdf | 2024-05-31 |