Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Semantics-based registration information security officer authentication capability evaluation method and system

A technology for registration information and information security, which is applied in the field of semantic-based registration information security personnel certification ability evaluation, can solve problems such as the inability to guarantee the level and ability of examinees in the test paper, and the inability to fully reflect the degree of mastery of the necessary knowledge for students' comprehensive application ability. , to reduce the memory burden, broaden the idea of ​​​​the question, and reduce the search time.

Inactive Publication Date: 2015-03-25
CHINA INFORMATION TECH SECURITY EVALUATION CENT
View PDF3 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (2) Although teachers spend a lot of time on writing questions, they still cannot guarantee that the test papers can reasonably evaluate the level and ability of candidates
It is a test evaluation standard that the candidate's test scores are up to standard, but there will be an improvement in the entire test score caused by the students' high mastery of certain knowledge points in certain fields, which cannot fully reflect the students' comprehensive application ability and specific position. The degree of mastery of the necessary knowledge in each field required

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Semantics-based registration information security officer authentication capability evaluation method and system
  • Semantics-based registration information security officer authentication capability evaluation method and system
  • Semantics-based registration information security officer authentication capability evaluation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The specific implementation of the invention will be described below by taking Certified Information Security Professional (CISP for short) as an example.

[0061] The specific implementation process of the certification ability assessment method for registered information security personnel is as follows:

[0062] The first part: Establish the ontology database of information security knowledge system;

[0063] The CISP syllabus stipulates the content and depth requirements of each knowledge point in the knowledge sub-domain, and divides the ability level into three categories: "understanding", "understanding", and "mastery". Understanding: is the minimum depth requirement, students only need to correctly understand the basic concepts and principles of the knowledge points; understanding: is a medium-depth requirement, students need to understand the content in depth on the basis of correctly understanding the basic concepts and principles of the knowledge points, And...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a semantics-based registration information security officer authentication capability evaluation method and system and relates to the field of information security. The method comprises the steps of establishing an information security knowledge system ontology library, establishing a knowledge association recommendation, establishing a knowledge association path recommendation based on the ontology library, a knowledge point association path between knowledge classes and an association path between knowledge bodies, conducting evaluation on students, giving a general statistical analysis semantics-based analysis result and forming an electronic report. The system comprises an authentication management module, an authentication examination module, a capability assessment management module and a system management module. According to the method and system, semantic association between evaluated knowledge points is considered in all the steps from knowledge system establishment to evaluation result analysis, so that the mechanical properties, caused by automatic processing, of evaluation are reduced, evaluation efficiency and quality are improved, the reasonability of a final evaluation result is guaranteed, and then the purpose of capability evaluation is better achieved.

Description

technical field [0001] The invention relates to the field of information security, and specifically proposes a method and system for evaluating the authentication ability of registered information security personnel based on semantics. Background technique [0002] With the continuous development of my country's informatization and global informatization, information security issues are increasingly closely related to public life and become the focus of attention. On February 27, 2014, the central government established a network security and informatization leading group, and the issue of information security was raised to a national strategic level. These have vigorously promoted the development of the information security industry, resulting in a large demand for information security talents. [0003] Due to the popularization and application of information technology, information security has gradually become one of the basic needs of ordinary people. What information ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30G09B7/02
CPCG06F16/211G06Q50/2057G09B7/02
Inventor 吴世忠李斌张晓菲邹静
Owner CHINA INFORMATION TECH SECURITY EVALUATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products