Security configuration checking framework based on plug-in unit and construction method thereof
A security configuration, plug-in technology, applied in the field of information security, to achieve the effect of small coupling, less correlation, maintaining unity and stability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0052] The specific implementation process will be described below by taking the construction of a framework for checking the security configuration of the Windows XP system as an example.
[0053] 1. Determine information security standards for security configuration checks.
[0054] For different network environments, different organizations have different requirements for system security, so it is also very important to choose an appropriate information security standard. Information security standards can be divided into several broad categories:
[0055] 1) Security Architecture and Framework Standards
[0056] 2) Layered security protocol standards
[0057] 3) Safety technical standards
[0058] 4) specific application safety standards
[0059] 5) Safety management standards
[0060] This implementation case adopts security architecture and framework standards.
[0061] 2. Build a configuration item knowledge base.
[0062] After determining the information securi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 