Vulnerability management system and method

A vulnerability management and vulnerability technology, applied in the field of vulnerability management system, can solve the problems of low work efficiency, manual information acquisition, lack of visual display of vulnerability distribution in manual management mode, etc., and achieve the effect of improving quality and efficiency

Active Publication Date: 2015-07-15
GUANGZHOU WONFONE TECH
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. The scale of the network is increasing day by day, and the type and number of devices are increasing, resulting in a wide variety of vulnerabilities and a huge number. Vulnerability scanning reports require a lot of manpower to analyze and sort out, statistical management is quite difficult, and analysis efficiency is low
[0004] 2. Lack of detailed and effective vulnerability tracking records, the efficiency of vulnerability rectification and reinforcement and work results are difficult to control, and it is difficult to understand the overall status of system vulnerabilities
There is no vulnerability information database, vulnerabilities appear repeatedly but hardening experience is difficult to share
[0005] 3. There are many vulnerabilities, but there is a lack of vulnerability device correlation analysis tools and key vulnerability warnings, making it difficult to find high-risk vulnerabilities in the first place
At the same time, manual methods are still used for vulnerability location and information acquisition, and the work efficiency is low.
[0006] 4. The current manual management model lacks an intuitive display of the distribution of vulnerabilities, making it difficult for the bureau to control the overall security situation within the scope of manage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability management system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0036] Such as figure 1 As shown, this embodiment discloses a vulnerability management system, including

[0037] The vulnerability scanning module is used to scan the vulnerabilities in the system and generate a vulnerability scanning report;

[0038] The vulnerability management module is used to import the vulnerability scanning report, manage the vulnerability through the analysis of the vulnerability scanning report, format and present the related information of the leakage, and record the business system and the scanning batch of the vulnerability information for subsequent use Comparative analysis; used to provide automatic update of vulnerability processing status, information display and vulnerability repair reference solutions, where the vulnerability repair reference solution is selected from the vulnerability repair solution library, and the relevant reference solutions and technical points are extracted from the vulnerability repair solution library. Managers can...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a vulnerability management system and method. The vulnerability management system comprises a vulnerability scanning module, a vulnerability management module, a vulnerability warning module, a vulnerability track processing module, a statistic analysis module and an asset equipment management module. Management control is conducted through vulnerability scanning, vulnerability warning, vulnerability management, vulnerability track processing, statistical analysis and asset equipment management. By the adoption of the vulnerability management system and method, all relevant information of vulnerability can be recorded in detail, tracking and tracing of the safety risk of a system device are facilitated, the safety condition of the whole network system can be effectively evaluated, the weak link in a network is identified, and then network security reinforcing work is guided.

Description

technical field [0001] The invention relates to the field of computer network information security, in particular to a loophole management system and method. Background technique [0002] The current vulnerability discovery and management methods of communication production network system equipment mainly use vulnerability scanners to scan system equipment and output vulnerability scanning reports, and security managers manually analyze the reports and generate vulnerability tracking reports. The existing vulnerability management mode is still in the stage of manual analysis and manual management, with poor management efficiency and management effect, and is no longer suitable for the trend and needs of large-scale and networked information systems. The business problems faced by the vulnerability management model at this stage mainly include the following aspects: [0003] 1. The scale of the network is increasing day by day, and the type and number of devices are increasi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57
Inventor 刘伟雄郑东曦蒋昆池
Owner GUANGZHOU WONFONE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products