Method and apparatus for monitoring degree of attack on system
A technology of degree and attack effect, applied in the field of information security, can solve the problems of inability to accurately and efficiently determine the degree of system attack, complex calculation of system attack degree, low accuracy rate, etc., and the realization process is simple and convenient, supported by reliable data , the effect of low complexity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.
[0024] figure 1 A flow chart of a method for monitoring the degree of system attack according to an embodiment of the present invention is shown, and the method may be implemented by a computer. like figure 1 As shown, the method may include: step S1, collecting data information of at least one data destruction attack effect evaluation index. For example, the data destruction attack effect evaluation index may be: the number of user account information that has been tampered with, the number of user account information that has been deleted, the number of user account information that has been added, the number of registry keys that have been tampered with, th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 