Threat data processing method for information system

A technology of information system and threat value, applied in the direction of electronic digital data processing, transmission system, instrument, etc., can solve the problems of irregular information security management and the inability to objectively reflect the threat of information system

Active Publication Date: 2017-10-10
国家电投集团河南电力有限公司 +1
View PDF8 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the information systems of various organizations, enterprises, etc. have irregular manage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat data processing method for information system
  • Threat data processing method for information system
  • Threat data processing method for information system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The core of the present invention is to provide a threat data processing method for an information system, realize index management of information security, and be able to objectively understand threats faced by a target information system.

[0044] In order to make the above objects, features and advantages of the present invention more comprehensible, the specific implementation manners of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0045] In the following description, specific details are set forth in order to provide a thorough understanding of the present invention. However, the present invention can be implemented in many other ways than those described here, and those skilled in the art can make similar extensions without departing from the connotation of the present invention. Accordingly, the present invention is not limited to the specific embodiments disclosed below.

[0046] Please refer to figur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a threat data processing method for an information system. The method comprises the steps that an obtained information security incident is mapped into a potential threat index and an existing threat index; threat frequency calculation is performed on the existing threat index, the result of the frequency calculation is assigned to the security index threat index related to the information security incident; according to a preset period, information collection, formation and correlation are performed on the potential threat index according to a preset threat source to obtain a threat multi-component system; each threat element in a log of a target information system is indexed, the threat multi-component system is used for working out the occurrence probability of the multi-component system on the basis of an indexation calculation method, and assignment and mapping are performed to obtain a threat value; according to the security domain threat index and the threat value, a corresponding data model is generated so as to evaluate the security of the information system. By building the data model, a user can conveniently and visually observe the occurrence probability of each threat in the information security incident, and the threat with which the information system is faced can be evaluated objectively.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a threat data processing method for an information system. Background technique [0002] With the interconnection and interoperability of the network, the application of information business is getting closer and closer, and the security threats faced by an organization's information system are more and more showing the situation of "internal and external attack". The threats in the virtual network world tend to be consistent with the physical threats. [0003] In order to ensure the security of information, it is necessary to identify and classify threats and take corresponding countermeasures. Threat identification requires the analysis of potential causes of accidents. There are various reasons for threats, which can be roughly divided into two categories: human factors and environmental factors. Power system information resources are attractive enough, and they ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57H04L29/06
CPCG06F21/577H04L63/1441
Inventor 余艳波易予江刘毅魏永利马新轶刘奉哲万钰李瑞雪李振宇李广奇
Owner 国家电投集团河南电力有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products