Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Classified management method applied to security baseline software

A security baseline, hierarchical management technology, applied in the direction of platform integrity maintenance, etc., to achieve the effect of improving throughput and performance, high access and business volume, security and operational management efficiency

Inactive Publication Date: 2016-10-26
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF7 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve this problem, the present invention proposes a hierarchical management method applied to security baseline software. The present invention can provide a centralized, hierarchical, infinitely cascaded and expanded security baseline software management system for complex and multi-level network users. Comprehensively collect system vulnerability information and security issues, and conduct a unified investigation of various security risks. The security center can integrate and release the security alarms and related security status of the entire network to establish a mechanism for centralized processing, filtering, linkage, and pre-release to improve security. Overall network information security construction level

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Classified management method applied to security baseline software
  • Classified management method applied to security baseline software
  • Classified management method applied to security baseline software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The content of the present invention is described in more detail below:

[0030] The security baseline software mainly protects the configuration items of the protected server, and is mainly applied to the operating system and application software running on the protected server. By simply setting scan and repair parameters, the protected server configuration items can be automatically scanned and repaired. The present invention provides a hierarchical management method applied to security baseline software, which supports a multi-layer cascading management mode, and is suitable for centralized management and control of multiple branches of large enterprises, or group management and control. In the cascade management mode, the lower-level centralized management platform can implement the security policy formulated by the upper-level management platform according to the requirements of the management platform; it can also realize timely alarms for important events and ab...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a classified management method applied to security baseline software, pertaining to the technical field of host security. The method comprises following respects including nodal point management, strategy management, knowledge base management, resource management, user management, log forms, alarm management and a security center. The classified management method applied to security baseline software has following beneficial effects: the method can be applied to the government, and enterprises and institutions so that comprehensive security kernel configuration services for computer terminals can be provided to help government-related departments set up a system for standardizing terminal security management, thereby obtaining the best management effect. The security and operation and management efficiency of computer terminals can be significantly improved so that security of government information is ensured.

Description

technical field [0001] The invention relates to the technical field of host security, in particular to a hierarchical management method applied to security baseline software. Background technique [0002] "Security baseline" is the minimum security guarantee of an information system. Generally speaking, if the most basic security requirements of the system are not met, the security risks brought about by it cannot be borne, while non-basic security requirements may bring The payment of excess security costs. In the face of huge information system assets, as information system operation and maintenance personnel or information system security managers, it is very difficult to analyze the security configuration of massive information assets. Different baseline configuration strategies, a baseline inspection management platform for remote detection of various information assets in batches, and support for repairing detected risks. [0003] At present, large-scale enterprises ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/57
Inventor 梁媛
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products