Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An audit method and system for information security

A technology of information security and security management, which is applied in the field of information security audit methods and systems, can solve problems such as omissions, wrong audits, time-consuming, and inability to perform information security audits, etc., so as to improve audit quality and improve audit quality. Work efficiency, reduce the effect of wrong review and missed review

Active Publication Date: 2018-06-19
ZICT TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] This compliance auditing method requires a large amount of human resources and system resources for data collection and risk identification, and it also takes a lot of time to compare compliance requirements, which is prone to omissions, wrong audits, etc. Audit problems, so that accurate and fine-grained information security audits cannot be achieved in management, and there are management loopholes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An audit method and system for information security
  • An audit method and system for information security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The basic idea of ​​the present invention is: configure the trigger rules of audit work behavior; collect work behavior data and management data; standardize the collected work behavior data and management data; Behavior data and management data, and conduct audits of staff's work behavior.

[0045] The present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments.

[0046] The present invention also provides an audit system for information security, figure 1 It is a schematic structural diagram of the audit system for realizing information security in the present invention, such as figure 1 As shown, the system includes: a management unit 10, a data collection unit 11, a processing unit 12, and an audit unit 13;

[0047] The management unit 10 is used to configure the trigger rules of the audit work behavior;

[0048] Data collection unit 11, used for collecting work behavior data and management data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information security audit method, which includes: configuring trigger rules for auditing work behavior; collecting work behavior data and management data; standardizing the collected work behavior data and management data; according to the configured trigger rules, And standardize the work behavior data and management data to audit the work behavior of the staff; the invention also provides an information security audit system. According to the technical solution of the present invention, the work efficiency of auditors or safety management personnel in auditing work behaviors can be improved, and wrong audits and missed audits in the auditing process can be reduced.

Description

technical field [0001] The present invention relates to information security technology, in particular to an information security audit method and system. Background technique [0002] With the continuous improvement of information construction in various industries, business operations are increasingly concentrated on information systems or information platforms, and various compliance control requirements, management measures and processes have gradually strengthened information management. The degree is also getting higher and higher. For security managers, it is necessary to regularly analyze data such as work behavior data and management logs of various IT equipment, whether they comply with the Sarbanes-Oxley Act (SOX, Sarbanes-Oxley Act), payment card industry (PCI, Payment Card Industry) data security standards ( DSS, Data Security Standard), International Organization for Standardization (ISO, International Organization for Standardization) 270001 and other relevan...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q10/06
Inventor 周辉
Owner ZICT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products