Unlock instant, AI-driven research and patent intelligence for your innovation.

Security configuration checking framework based on plug-in unit and construction method thereof

A security configuration, plug-in technology, applied in the field of information security, to achieve the effect of small coupling, less correlation, maintaining unity and stability

Inactive Publication Date: 2013-06-26
ZHONGKE INFORMATION SECURITY COMMON TECH NAT ENG RES CENT CO LTD
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the flaws and loopholes in the design of computer systems, network equipment, etc., as well as the imperfect factors of the network protocol itself, hackers are provided with good intrusion opportunities and cause great security risks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security configuration checking framework based on plug-in unit and construction method thereof
  • Security configuration checking framework based on plug-in unit and construction method thereof
  • Security configuration checking framework based on plug-in unit and construction method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The specific implementation process will be described below by taking the construction of a framework for checking the security configuration of the Windows XP system as an example.

[0053] 1. Determine information security standards for security configuration checks.

[0054] For different network environments, different organizations have different requirements for system security, so it is also very important to choose an appropriate information security standard. Information security standards can be divided into several broad categories:

[0055] 1) Security Architecture and Framework Standards

[0056] 2) Layered security protocol standards

[0057] 3) Safety technical standards

[0058] 4) specific application safety standards

[0059] 5) Safety management standards

[0060] This implementation case adopts security architecture and framework standards.

[0061] 2. Build a configuration item knowledge base.

[0062] After determining the information securi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security configuration checking framework based on a plug-in unit and a construction method thereof. The framework comprises a configuration item knowledge base, a base line base, a configuration item checking plug-in unit base and a corresponding correlation chart of a configuration item and the checking plug-in unit. Through supports of the knowledge base and the base line base, checking capability of the framework is extended, adaptability of the framework on the network environment is flexible; a configuration item checking technique is sealed in a mode of the plug-in unit to well apply the plug-in unit technique to the field of safety evaluation, and extraction of configuration information is completed in an authorization read-only mode; and the corresponding correlation of the checking plug-in unit brings convenience to mutual calling and supporting between plug-in units.

Description

technical field [0001] The invention designs a security configuration inspection framework and a construction method thereof, in particular to a plug-in-based security configuration inspection framework and a construction method thereof, belonging to the field of information security. Background technique [0002] The rapid development of the Internet enables people to obtain information, exchange information, manage information and carry out various social activities more conveniently, providing a powerful impetus for the development of society. However, due to design flaws and loopholes in computer systems and network equipment, as well as imperfect factors in the network protocol itself, hackers are provided with good intrusion opportunities and cause great security risks. Therefore, it is especially necessary to check the security configuration of the system and network in advance. However, the previous security configuration inspection tools are often only aimed at a c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/44G06F21/55
Inventor 连一峰张海霞陈平黎泽宇
Owner ZHONGKE INFORMATION SECURITY COMMON TECH NAT ENG RES CENT CO LTD