Vulnerability management system and vulnerability management method

A vulnerability management and vulnerability technology, applied in the field of information security, can solve problems such as low efficiency in processing and vulnerability management, inability to comprehensively discover assets, etc.

Active Publication Date: 2017-05-31
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF8 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The embodiment of the present invention provides a vulnerability management system and method to solve the problems in the prior art that all asset

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability management system and vulnerability management method
  • Vulnerability management system and vulnerability management method
  • Vulnerability management system and vulnerability management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0089] The following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0090] In order to solve the problem that all assets cannot be fully discovered in the prior art, and the efficiency of vulnerability management is relatively low and cannot be processed in combination with actual business. In the embodiment of the present invention, a vulnerability management system is provided, which adds an intelligence-based system to discover Assets scans for vulnerabilities in assets in the system, and introduces a vulnera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of information security, and in particular to a vulnerability management system and a vulnerability management method. The vulnerability management system comprises an asset management module, a vulnerability scanning module, a vulnerability management module, a vulnerability processing module and a vulnerability analyzing module; all assets including public network assets and vulnerability can be comprehensively found by the asset management module and the vulnerability scanning module; analysis, trace and management of the vulnerability are realized by the vulnerability analyzing module, the vulnerability processing module and the vulnerability management module, so that the vulnerability management system has the effects that detailed record and trace can be carried out on the assets and the vulnerability, security conditions of the assets and the vulnerability in the system also can be evaluated and the management efficiency of the assets and the vulnerability in the system is improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a vulnerability management system and method. Background technique [0002] At present, people are paying more and more attention to network security, and the protection of assets is becoming more and more important. Assets need to be checked, and loopholes should be recorded and corrected at the same time, so as to achieve controllability of risks while minimizing risks and regulated. [0003] Most of the vulnerability management systems in the prior art can only provide basic vulnerability management capabilities at present, and cannot meet the requirements for many problems in actual business operations: [0004] 1) In terms of asset sorting, the method of internal scanning + manual input and supplement is adopted. It is impossible to accurately locate public network assets. Because of the particularity of the public network, it cannot adapt to the method of asset scanning...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1433
Inventor 吴昊古琳莹张楠
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products