Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vulnerability management system and method

A vulnerability management and vulnerability technology, applied in the field of vulnerability management system, can solve the problems of low work efficiency, manual information acquisition, lack of visual display of vulnerability distribution in manual management mode, etc., and achieve the effect of improving quality and efficiency

Active Publication Date: 2015-07-15
GUANGZHOU WONFONE TECH
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. The scale of the network is increasing day by day, and the type and number of devices are increasing, resulting in a wide variety of vulnerabilities and a huge number. Vulnerability scanning reports require a lot of manpower to analyze and sort out, statistical management is quite difficult, and analysis efficiency is low
[0004] 2. Lack of detailed and effective vulnerability tracking records, the efficiency of vulnerability rectification and reinforcement and work results are difficult to control, and it is difficult to understand the overall status of system vulnerabilities
There is no vulnerability information database, vulnerabilities appear repeatedly but hardening experience is difficult to share
[0005] 3. There are many vulnerabilities, but there is a lack of vulnerability device correlation analysis tools and key vulnerability warnings, making it difficult to find high-risk vulnerabilities in the first place
At the same time, manual methods are still used for vulnerability location and information acquisition, and the work efficiency is low.
[0006] 4. The current manual management model lacks an intuitive display of the distribution of vulnerabilities, making it difficult for the bureau to control the overall security situation within the scope of management
In addition, the three-party information transmission of vulnerability-related work adopts the file transmission method. The vulnerability tracking form needs to be transmitted among security operation and maintenance personnel, third-party manufacturers, and customers, which is prone to delay and loss of information transmission, and it is difficult for customers to know the overall system rectification status in a timely manner.
[0007] For example, for mobile communication operators, their internal network management network involves many business systems, complex equipment, and many daily businesses. Therefore, it is necessary to scan and repair vulnerabilities in each business system of the entire network on a monthly or quarterly basis. In most current systems, in After the vulnerability scanning device generates a vulnerability scanning report, a large number of security service personnel will analyze the report, then formulate a vulnerability repair plan, and then dispatch the order. However, due to the large and complex characteristics of the business system, it is difficult for managers to follow progress, how to deal with vulnerabilities, and the difficulty of accurately assessing the health and security threats of the entire network management network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability management system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0036] Such as figure 1 As shown, this embodiment discloses a vulnerability management system, including

[0037] The vulnerability scanning module is used to scan the vulnerabilities in the system and generate a vulnerability scanning report;

[0038] The vulnerability management module is used to import the vulnerability scanning report, manage the vulnerability through the analysis of the vulnerability scanning report, format and present the related information of the leakage, and record the business system and the scanning batch of the vulnerability information for subsequent use Comparative analysis; used to provide automatic update of vulnerability processing status, information display and vulnerability repair reference solutions, where the vulnerability repair reference solution is selected from the vulnerability repair solution library, and the relevant reference solutions and technical points are extracted from the vulnerability repair solution library. Managers can...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a vulnerability management system and method. The vulnerability management system comprises a vulnerability scanning module, a vulnerability management module, a vulnerability warning module, a vulnerability track processing module, a statistic analysis module and an asset equipment management module. Management control is conducted through vulnerability scanning, vulnerability warning, vulnerability management, vulnerability track processing, statistical analysis and asset equipment management. By the adoption of the vulnerability management system and method, all relevant information of vulnerability can be recorded in detail, tracking and tracing of the safety risk of a system device are facilitated, the safety condition of the whole network system can be effectively evaluated, the weak link in a network is identified, and then network security reinforcing work is guided.

Description

technical field [0001] The invention relates to the field of computer network information security, in particular to a loophole management system and method. Background technique [0002] The current vulnerability discovery and management methods of communication production network system equipment mainly use vulnerability scanners to scan system equipment and output vulnerability scanning reports, and security managers manually analyze the reports and generate vulnerability tracking reports. The existing vulnerability management mode is still in the stage of manual analysis and manual management, with poor management efficiency and management effect, and is no longer suitable for the trend and needs of large-scale and networked information systems. The business problems faced by the vulnerability management model at this stage mainly include the following aspects: [0003] 1. The scale of the network is increasing day by day, and the type and number of devices are increasi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57
Inventor 刘伟雄郑东曦蒋昆池
Owner GUANGZHOU WONFONE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products