Off-line compliance security audit method of IT simulation infrastructure

A technology of security auditing and infrastructure, applied in the field of network security, to achieve high security and security effects

Inactive Publication Date: 2014-10-22
北京随方信息技术有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, domestic IT audit projects are still in the state of manual audit and monitoring audit, and the concept of automatic software audit has not been formed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] As shown in Figure 1, an IT simulation infrastructure off-line compliance security audit method described in the embodiment of the present invention includes the following steps

[0019] 1) Collection of configuration information: Before the offline physical examination, the configuration information of the detected device needs to be collected; the collected information includes the current configuration of the device and other status information about ports and routes. The collection method is to log in to the detected device and enter For the specified command, the configuration information is archived in the form of a txt text document or html to prepare for importing the device; when a special device type is encountered, after the information is collected, it needs to be converted into the command format of the supported device type;

[0020] 2) Import / create network topology: automatically import network topology through configuration commands, automatically genera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a safe auditing method of IT simulation infrastructure offline compliance. The method comprises the following steps: collecting configuration information; introducing / establishing a network topology; selecting verification / auditing rules; operating a test; generating a report; and correcting configuration or a model. Beneficial effects of the invention are as follows: IT risk localization and risk management are provided for a client as well as an intelligent analysis and automatic monitoring are also provided for the client; end-to-end auditing analyses can be carried out on network equipment, a wide area network link and a local area network link; a potential instable factor can be discovered in advance; rapid and accurate auditing and analyses can be carried out on a whole network infrastructure, so that a safe plan can be realized; besides, during the detection by the method in the invention, normal operation of an existing network will not be interfered; high security can be provided for an existing production network; and there is no potential or direct risk.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an off-line compliance security audit method of an IT simulation infrastructure. Background technique [0002] In building new networks, upgrading existing networks, or testing new protocol projects, it is necessary to objectively evaluate the reliability and effectiveness of the network, so as to reduce the investment risk of network construction, so that the designed network has high performance, or Make the test results truly reflect the performance of the new protocol. Traditional network design and planning methods mainly rely on experience. For complex large-scale networks, many places cannot grasp the key points of design due to unpredictability. Therefore, a new method of network planning and design is increasingly needed. [0003] Under the current existing trend, the development of IT audit software will liberate the industry from relying on people, and make ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24H04L12/26
Inventor 吴伟湘战伟
Owner 北京随方信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products