Security configuration vulnerability monitoring method, device, and computer-readable storage medium
A security configuration and vulnerability technology, applied in the security field, can solve the problems of intranet attacks, affecting the normal operation of the system, time-consuming and laborious, etc., and achieve the effect of preventing attacks.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0052] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0053] In the following description, use of suffixes such as 'module', 'part' or 'unit' for denoting elements is only for facilitating description of the present invention and has no specific meaning by itself. Therefore, 'module', 'part' or 'unit' may be used in combination.
[0054] Please refer to Figure 1~2, figure 1 It is a method flowchart of the security configuration vulnerability monitoring method 100 in the first embodiment of the present invention, figure 2 for use figure 1 A schematic diagram of the module architecture of the security configuration vulnerability monitoring system 200 of the security configuration vulnerability monitoring method 100 .
[0055] The security configuration vulnerability monitoring system 200 is configured in an Internet system and can be implemented in various forms. Fo...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com