Safety emergency response method and system based on analytic hierarchy process

An analytic hierarchy process and emergency response technology, applied in the field of information security, can solve problems such as the inability to clearly provide emergency response plans, unclear risk ratings, and complex calculations of risk assessment algorithms

Active Publication Date: 2021-03-02
ZHEJIANG PONSHINE INFORMATION TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the risk assessment algorithm can eliminate the impact caused by the unreasonable selection of assessment factors and the inability to objectively reflect the system status through risk correlation analysis, the risk assessment algorithm has complex calculations, a large amount of data, and unclear risk ratings. Sexual emergency response plan

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety emergency response method and system based on analytic hierarchy process
  • Safety emergency response method and system based on analytic hierarchy process
  • Safety emergency response method and system based on analytic hierarchy process

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] Such as figure 2 As shown, the safety emergency response method based on the analytic hierarchy process in this embodiment 1 specifically includes the following steps:

[0080] Step A1: Determine the risk assessment object;

[0081] Step A2: Determine whether the risk assessment object is in a special scene, if so, go directly to step A11 for risk level assessment, otherwise go to step A3;

[0082] Among them, referring to Table 1, the judgment indicators for special scenarios include network security domain and asset security attributes. The network security domain includes three secondary indicators of the public network, DCN, and intranet, and its risk portfolio includes three combinations of {public network, DCN}, {public network, intranet}, and {public network, DCN, intranet}. The combination mainly considers the impact on intranet assets after being attacked in the direction of the public network; asset security attributes include five secondary indicators of v...

Embodiment 2

[0181] Such as Figure 7 As shown, the present invention is based on the AHP-based security emergency response method, and also designs a security emergency response system based on the AHP, including a judgment module, an index construction module, an index assignment module, a calculation module, an evaluation module and a disposal module. The judgment module is used to judge whether the risk assessment object is in a special scene; the index construction module is used to construct the index system of assets, vulnerabilities and threats for the risk assessment object; The calculation module is used to calculate the scores of asset losses and safety incidents and obtain the corresponding risk value; the evaluation module is used to divide the risk level according to the size of the risk value; the disposal module is used to propose corresponding measures for different risk levels. Disposal countermeasures. The system has a simple structure and can respond to security incide...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention belongs to the technical field of information security, and specifically relates to a safety emergency response method and system based on the analytic hierarchy process. The method includes the following steps: S1, determining a risk assessment object; S2, judging whether the risk assessment object is in a special scene, If yes, go to step S5, if not, build an index system of assets, vulnerabilities and threats; S3, assign scores to asset indexes, use the analytic hierarchy process to assign scores to vulnerability indexes and threat indexes, and calculate asset losses and security incidents Score and obtain the corresponding risk value; S4, divide the risk level according to the risk value; S5, put forward corresponding disposal countermeasures for different risk levels. The invention further quantifies and classifies the security risks of assets by comprehensively considering the importance of assets, the severity of vulnerability, and threats, effectively shortens the emergency response cycle of security events, curbs the spread of security risks, and improves the overall security emergency response efficiency.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a security emergency response method and system based on analytic hierarchy process. Background technique [0002] With the rapid development of the mobile Internet, cloud computing is further implemented, and NFV (Network Function Virtualization) technology is becoming more and more mature and commercialized. Under a huge IT architecture, security risks will further expand, such as intrusion attacks, web page tampering, DDoS and other security risks. The probability of occurrence of incidents and the scope of protection will increase accordingly, and new security risks will also emerge. Therefore, new requirements are put forward for safety protection technology, safety risk management, and emergency response methods. [0003] After a security incident occurs, it not only affects normal business operations, but also causes very bad social impact. The l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q10/06
CPCG06Q10/0635
Inventor 陈晓莉章亮徐菁马峰林建洪黄勇
Owner ZHEJIANG PONSHINE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products