Automatic configuration management system for network security

An automatic configuration management and security configuration technology, applied in the field of network security, can solve the problems of not covering different devices, not enabling access control, not enabling encryption, etc.

Active Publication Date: 2014-11-05
汪志
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Exploiting device configuration flaws: such as not enabling encryption, not enabling secure channels, not restricting root privileges, not enabling effective access control, etc.;
[0010] However, the above two types of technologies have obvious defects: the first type of technology can only locate the improper configuration, and cannot repair according to the correct configuration; the second type of technology can only repair individual devices or systems, and cannot cover Different equipment (such as network equipment, security equipment, etc.), different systems (such as windows, linux, etc.) and different software (such as oracle, mysql, etc.)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic configuration management system for network security
  • Automatic configuration management system for network security
  • Automatic configuration management system for network security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The present invention will be described in further detail below through specific implementation examples and in conjunction with the accompanying drawings.

[0053] The embodiment of the present invention provides a network security automatic configuration management system, such as figure 1 shown, including:

[0054]The configuration connection module 102 is used to connect with the object to be scanned; wherein, the object to be scanned includes a combination of two or more of the following objects: network equipment, electronic equipment, system and database;

[0055] The daily operation module 103 is configured to perform operation processing on the connected object to be scanned; wherein, the operation processing at least includes: scanning configuration files in the object to be scanned, locating entries of configuration defects in the configuration files, and performing security on the entries of configuration defects Configuration fixes.

[0056] The network s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an automatic configuration management system for network security. The automatic configuration management system comprises a configuration connection module and a daily operation module, wherein the configuration connection module is connected to an object to be scanned, wherein the object to be scanned comprises a combination of two or more of the following objects: network equipment, electronic equipment, a system and a database; the daily operation module is used for carrying out operation processing on the connected object to be scanned, wherein the operation processing at least comprises the following steps of: scanning a configuration file in the object to be scanned, positioning clauses with configuration defect in the configuration file, and carrying out security configuration repair on the clauses with configuration defect. The automatic configuration management system provided by the invention is capable of scanning a combined object, correctly positioning the improperly configured position in the combined object, and meanwhile, carrying out security configuration repair on the clauses with configuration defect (namely, improper configuration) of the combined object, so that the combined object conforms to the standard requirement of the configuration, and security of operation of the configuration file of the combined object is greatly improved.

Description

technical field [0001] The invention relates to the field of network security, in particular to a network security automatic configuration management system. Background technique [0002] With the development of network technology, the number of information security incidents has increased rapidly, and the security situation is not optimistic. According to statistics, in 2012, the National Internet Emergency Response Center (CNCERT) received a total of 19,124 network security incident reports (excluding scanning and spam incidents), an increase of 24.5% compared with 2011; There were 18,805 incidents, an increase of 72.1% compared with 2011. Overall, the number of network information security incidents in my country has shown a rapid increase in recent years, directly affecting the rights and interests of netizens and enterprises, hindering the healthy development of the industry, and the overall information security situation is not optimistic. [0003] Nowadays, the solu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
Inventor 汪志冯俊杰胡家胜
Owner 汪志
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products