Method and device for security configuration optimization

A technology for securely configuring and optimizing devices, which is applied in the field of network security and can solve problems such as low usability

Active Publication Date: 2014-09-10
NSFOCUS INFORMATION TECHNOLOGY CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a security configuration optimization method and device to solve the problem in the prior art that although the configured system can meet the security requirements, the usability is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for security configuration optimization
  • Method and device for security configuration optimization
  • Method and device for security configuration optimization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] When configuring the configuration items in the system in the prior art, only the impact of the configuration items on the system security is considered, and the impact of the configuration items on the usability of the system is not considered, so the configured system often meets the safety requirements requirements, but very low usability. The embodiment of the present invention aims to select a combination of configuration items that minimizes the reduction in system usability from the configuration items included in the system under the premise of meeting the system security requirements, and configure the configuration according to the selected configuration item combination After the system is installed, the configured system can be configured to maximize the usability of the system on the premise of meeting the security requirements.

[0024] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for security configuration optimization, which are used for solving the problems that the usability of a configured system is low in the prior art. The method comprises the steps of determining configuration item assemblies with the sum of the security weights corresponding to contained configuration items larger than a set security threshold according to the security weights corresponding to the configuration items contained in the system, selecting a configuration item assembly with the minimum sum of usability loss weights corresponding to the contained configuration terms in the determined configuration item assemblies according to the usability loss weights corresponding to the configuration terms, and configuring the system according to the contained configuration terms in the selected configuration item assembly. According to the method, the selected configuration item assembly not only meets the security requirement of the system, but also least affects the usability of the system, so that as being configured according to the selected configuration item assembly, the configured system meets the security requirement and simultaneously improves the usability.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method and device for optimizing security configuration. Background technique [0002] As network security issues become increasingly prominent, each enterprise establishes its own security configuration specification according to business needs and network environment, and performs system configuration on the operating system, database, application software, and network equipment according to the security configuration specification. During the system configuration process, , usually only consider the requirements of security, ignoring the convenience of use. On the other hand, it is also difficult to find a combination of configuration items that not only satisfies security but also improves usability from numerous configuration items. [0003] Illustrate with a simple example. Assuming that the network cable interface, universal serial bus (Universal Serial Bus, USB) interf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 刘丹
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products