Method and device for monitoring the degree of system attack
A technology of degree and attack effect, applied in the field of information security, it can solve the problems of low accuracy, complex calculation of the degree of attack of the system, inability to accurately and efficiently determine the degree of attack of the system, etc., to achieve reliable data support, and the process is simple and convenient. , low-complexity effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] The specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present invention, and are not used to limit the present invention.
[0024] figure 1 It shows a flowchart of a method for monitoring the degree of attack of a system according to an embodiment of the present invention, and the method can be implemented by a computer. Such as figure 1 As shown, the method may include: step S1, collecting data information of at least one data destruction attack effect evaluation index. For example, the data destruction attack effect evaluation index may be: the number of tampered user account information, the number of deleted user account information, the number of added user account information, the number of tampered registry keys, the number of deleted registry keys , The number of registry keys ad...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


