Method and device for monitoring safety status
A security state, monitored technology, applied in the computer field, can solve the problems of inability to monitor the system process in a unified manner, inability to monitor the system monitoring, and inability to monitor the state of the system environment.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0040] Such as figure 2 As shown, this embodiment provides a method for monitoring security status, and the specific implementation steps are as follows:
[0041] In step 201, the environment information of the monitored object is obtained and each task of the monitored object obtains the value generated when the monitored object is running. Wherein, the environment information includes: the usage status of the hard disk space where the monitored object is located and / or the real-time process status of the monitored object.
[0042] In step 202, the security level corresponding to the acquired environmental information is determined according to the preset correspondence between the environmental information and the security level.
[0043] In step 203, the task monitoring information of the monitored object is analyzed according to the value. Wherein, the task monitoring information includes: any one or more items of the serial number of the monitored object, the network a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


