Business analysis method and apparatus, and business security assessment method and system
A business analysis and evaluation system technology, applied in the field of business analysis methods and devices, can solve problems such as lack of pertinence, difficulty in finding security problems, unfamiliar business, etc., and achieve the effect of improving effectiveness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0071] Please refer to Figure 1 to Figure 3 , this embodiment provides a business analysis method, including:
[0072] Step S1, a step of analyzing the business by using the enterprise architecture model.
[0073] Among them, the enterprise architecture model includes the business layer, data layer, application layer and infrastructure layer from top to bottom; the description of the business corresponds to the business layer; the input data, output data and control data corresponding to the business correspond to the data layer; The software application system that supports business corresponds to the application layer; the facilities that support the communication of the software application system and the hardware and software platform for information processing correspond to the infrastructure layer.
[0074] Please refer to figure 2 , software application system communication facilities and information processing hardware and software platform include network domain X...
Embodiment 2
[0090] Please refer to Figure 4 and Figure 5 , this embodiment provides a method for evaluating service security, including: the service analysis method in Embodiment 1. Through the service analysis method in Embodiment 1, through the corresponding relationship between layers corresponding to the service, the cause of the security problem of the service can be found, thereby improving the effectiveness of service sorting.
[0091] Wherein, after the steps of the business analysis method in Embodiment 1, it also includes:
[0092] Step S2, using the threat model to conduct threat analysis on the business, so as to generate the security requirements of the business itself.
[0093] In this embodiment, the STRIDE model of Microsoft Corporation is used for threat analysis, mainly analyzing six types of threats of counterfeiting, tampering, denial, information leakage, denial of service and privilege escalation, as shown in Table 2 below.
[0094] Table 2 STRIDE model
[0095...
Embodiment 3
[0124] Please refer to Figure 6 , this embodiment provides a service analysis device, including an analysis module 1; the analysis module 1 is used to analyze services by using an enterprise architecture model.
[0125] Among them, the enterprise architecture model includes the business layer, data layer, application layer and infrastructure layer from top to bottom; the description of the business corresponds to the business layer; the input data, output data and control data corresponding to the business correspond to the data layer; The software application system that supports business corresponds to the application layer; the facilities that support the communication of the software application system and the hardware and software platform for information processing correspond to the infrastructure layer.
[0126] Among them, the analysis module 1 is specifically used to combine the functional modeling in the integrated computer-aided manufacturing with the business laye...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


