System and method for supplying information security operation service to medium-sized and small enterprises

A technology for information security, small and medium-sized enterprises, applied in the field of network management, business management, and information security, it can solve the problems of lack of equipment linkage, no OMC, and inability to obtain knowledge, and achieve the effect of reducing information security operation and maintenance costs and improving security.

Inactive Publication Date: 2016-03-09
NANJING LIANCHENG TECH DEV
View PDF3 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The advantages of this model are: special tool software is deployed to assist enterprise information network security management, and special personnel are arranged for security management, which is conducive to providing enterprise information network security; but its disadvantages are: the procurement management system requires special funds; in addition , but also requires later investment, such as upgrade costs, personnel training costs, etc. What's worse, the research and development manufacturers of enterprise information network security management systems cannot obtain more practical application experience from the products they have sold, because many times, enterprises The problems of information network security are solved by the information security management personnel inside the enterprise, and the manufacturer will not be notified of the processing process, so the manufacturer cannot effectively obtain knowledge from the enterprise user side, and then improve its product functions, Performance and knowledge sharing
Due to the increasingly complex network environment and endless attack methods, the problem of information security can no longer be solved by purely static information security equipment. On the other hand, there is no OMC (Operation and Maintenance Center, operation and maintenance center) and network management, or only simple Static network management functions and lack of linkage between devices; professional information security operation and maintenance services must be sought

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for supplying information security operation service to medium-sized and small enterprises
  • System and method for supplying information security operation service to medium-sized and small enterprises
  • System and method for supplying information security operation service to medium-sized and small enterprises

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] Below is further detailed description of the present invention according to accompanying drawing and example:

[0054] Such as figure 1 As shown, it is a functional diagram of the network information security operation and maintenance service system of the small and medium-sized enterprise information system of the present invention. It includes a security operation and maintenance data acquisition module, a security operation and maintenance service module, a security policy module and a security operation and maintenance support module.

[0055] The security operation and maintenance data collection module includes the message detection module , terminal security management module , host security management module and network device management module .

[0056] The security operation and maintenance service module includes the asset security management module and business security management module .

[0057] Among them, the terminal security management ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system for supplying information security operation service to medium-sized and small enterprises. The system comprises the components of a security operation data acquiring module, a security operation service module, a security operation supporting module and a security policy module. The security operation data acquiring module comprises a message detecting module, a terminal security management module, a host security management module and a network equipment security management module. The security operation service module comprises an asset management module and a service management module. The security operation supporting module performs the functions of enterprise user management, identity authentication, authorization charging, service management, terminal management and statistical analysis. The security policy module is used for setting security baseline data, a security event processing strategy, an invasion detecting rule, a security event reporting rule and a service association rule.

Description

technical field [0001] The invention relates to the technical fields of information security, network management and business management, in particular to a system and method for providing information security operation and maintenance services to small and medium-sized enterprises. Background technique [0002] Today, with the continuous development of computer technology and network technology, the daily operation of enterprises is inseparable from the information network. Whether it is a large enterprise group, a large enterprise, or a small and medium-sized enterprise, or even a start-up workshop, it has its own information network. . Although the information network makes internal office work, market information collection, new technology and remote collaboration and communication more convenient, and brings convenience to the operation and development of enterprises; however, information security is always a serious concern for enterprises. The endless viruses, increa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/46H04L12/24
CPCH04L12/4633H04L41/28H04L63/0485H04L63/0815H04L63/14H04L63/1433H04L63/20H04L41/0213H04L67/56
Inventor 凌飞李木金
Owner NANJING LIANCHENG TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products