Unlock instant, AI-driven research and patent intelligence for your innovation.

A Checking Method of Hierarchical Protection Security Boundary

A technology of security boundary and inspection method, applied in the field of level protection, can solve problems such as low efficiency, difficult identification, poor effect, etc., and achieve the effect of ensuring effectiveness

Inactive Publication Date: 2020-09-01
STATE GRID CORP OF CHINA +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The boundary of the current level of information security protection is usually manually inspected, so there are problems such as low efficiency, difficulty in identification, and poor effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Checking Method of Hierarchical Protection Security Boundary

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Below in conjunction with accompanying drawing and specific implementation mode, a kind of inspection method of graded protection security boundary of the present invention will be further described:

[0017] Such as figure 1 As shown, the information security protection system is usually divided into various security domains such as marketing domain, desktop domain or ERP domain, and the security protection boundaries between security domains are usually called inter-domain security boundaries (ie, figure 1 shown by the thick solid line in ), and the security protection boundary in the same security domain is usually called the intra-domain security boundary (ie figure 1 shown by the dotted lines within each security domain in ). In order to ensure the effectiveness of these safety protection boundaries, the steps of the inspection method adopted by the present invention are as follows:

[0018] ① Install the probe software for all machines connected to the network i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an inspection method of a grade protection security boundary. The inspection method comprises steps of firstly installing probe software for machines connected to the network in a domain, wherein probes in different domains communicate with each other once at an interval of 24 hours, and returning data of a source IP address, a target IP address and a feedback result about whether the communication is successful or not; uploading the returned data to a database server in an unified manner; marking according two pointing directions between every two domains based on domains to which the source IP address and the target IP address belong; according the quantity M of the domains, establishing M*(M-1) sheets to store the returned data; using repeated data fed back by probes in the same domain to carry out summarizing so as to obtain a boundary access strategy between domains; and finally, comparing a processing result of the returned data every time with the processing result of the previous time to obtain an adjustment change condition of a security boundary. According to the invention, identification efficiency and accuracy can be improved; under the condition that the security boundary is often changed, the validity of the security protection boundary is ensured and hidden safety hazards can be timely found.

Description

Technical field: [0001] The invention relates to the technical field of graded protection of information security, in particular to a method for checking the safety boundary of graded protection. Background technique: [0002] According to the overall security protection plan of the SG186 informatization project of the State Grid Corporation of China, the security protection policy of "partitioning, grading, and domain division" is adopted for the security protection system construction of the management information large area system, and each system is divided into corresponding security domains for protection. Specifically, it means that on the basis of dividing the information system of the State Grid Corporation into the management information area and the production control area, the system of the management information area is divided into security domains according to the grading situation and the type of business system, so as to achieve different security levels. Do...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0209H04L63/107
Inventor 孙建蔡翔王存珂
Owner STATE GRID CORP OF CHINA