Scheduling method and scheduling system of vulnerability scanning tool
A vulnerability scanning and scheduling method technology, applied in the field of information security, can solve the problems of queuing and execution of vulnerability scanning tasks, long vulnerability scanning time, and heavy vulnerability scanning workload, so as to improve vulnerability scanning time, avoid overload work, and improve vulnerability The effect of scan speed
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0050] In order to enable those skilled in the art to better understand the technical solutions in the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described The embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.
[0051] In the scheduling method of the vulnerability scanning tool provided in this embodiment, the vulnerability scanning platform can be constructed through the configuration relationship among the vulnerability scanning device, the device to be scanned, and the vulnerability type to create and assign scanning tasks. In order to ensure...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


