Data processing method and device
A data processing and indexing technology, applied in the field of network security, which can solve the problems of insufficient consideration of security situation statistics and inaccurate network security situation assessment results, and achieve accurate asset security situation assessment results, improve reliability, and statistics. Comprehensive effect of data
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0054] Example one
[0055] figure 1 It is a schematic flow diagram of a data processing method in the security situation assessment process at the asset level provided in the first embodiment of the present invention. Such as figure 1 As shown, the method includes the following steps:
[0056] S11. Obtain the weight value, asset vulnerability index and asset threat index of the asset value of the specified asset;
[0057] The asset value is the inherent property of the asset, and the asset value is specified when the asset is added. Asset value is the characteristic value of asset importance. In the embodiment of the present invention, after a certain designated asset is determined, the asset value of the designated asset can be obtained, thereby further obtaining the weight value of the asset value.
[0058] In the embodiment of the present invention, the asset value can be divided into core asset A, key asset B, important asset C, general asset D and simple asset E, and the corre...
Example Embodiment
[0145] Example two
[0146] It should be noted that the business system is determined by the business content carried by the asset and divided by customers, such as OA system, mail system, etc. The network security situation assessment at the business system level needs to consider the security status of the assets under the business system. For an asset, the business system is also one of its attributes, used to indicate the business content carried by the asset. Each asset belongs to a business system, and each business system can have multiple assets. There is a one-to-many relationship between business systems and assets.
[0147] The data processing method of the network security situation assessment process at the business system level includes: calculating a business system's business system security index, business system threat index, and business system vulnerability index;
[0148] Among them, the process of calculating the business system security index of a business s...
Example Embodiment
[0181] Example three
[0182] It should be noted that a customer has multiple business systems, so the security status at the customer level is determined by all business systems belonging to the customer. The data processing method of the network security situation assessment process at the customer level includes: calculating the customer safety index, the customer threat index and the customer vulnerability index.
[0183] As a specific embodiment of the present invention, the method for calculating the customer safety index is as follows Figure 7 Shown, including:
[0184] S71. Obtain the security risk indexes of all business systems owned by a customer and the weights of each business system level:
[0185] According to the data processing method described in the second embodiment, the security risk indexes of all business systems owned by a customer are obtained.
[0186] It should be noted that, in the embodiment of the present invention, different business systems are provided...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap