Method for calculating regional safety protection capability and computing device

A security prevention and regional technology, applied in the field of network security, to achieve the effect of accurate evaluation results

Active Publication Date: 2018-01-30
BEIJING KNOWNSEC INFORMATION TECH
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, there are still some defects in applying the existing technology to the security protection capability of the computing area, which needs to be improved urgently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for calculating regional safety protection capability and computing device
  • Method for calculating regional safety protection capability and computing device
  • Method for calculating regional safety protection capability and computing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0021] figure 1 is a block diagram of an example computing device 100 . In a basic configuration 102 , computing device 100 typically includes system memory 106 and one or more processors 104 . A memory bus 108 may be used for communication between the processor 104 and the system memory 106 .

[0022] Depending on the desired configuration, processor 104 may be any type of processing including, but not limited to, a microprocess...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for calculating a regional safety protection capability. The method comprises: safety vulnerability information of all regions is obtained at a predetermined time interval; according to the safety vulnerability information, vulnerability repairing speeds of all regions within all periods of time are calculated; the vulnerability repairing speed of each region is compared with a preset standard value to obtain a comparison result; and on the basis of the comparison results, safety protection capabilities of all regions are determined. In addition, the inventionalso discloses a corresponding computing device.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a calculation method and a calculation device for regional security prevention capabilities. Background technique [0002] With the development of network security technology, the calculation and application of regional security defense capabilities have become increasingly important. For example, by calculating the safety and defense capabilities of a certain area, the city's safety level is rated. [0003] There are many existing network security assessment methods. Taking the risk assessment scheme based on security threats and vulnerabilities as an example, the specific operation steps are: obtain one or more security vulnerabilities existing in the computer, and assign a risk level to each security vulnerability according to the degree of danger of the security vulnerabilities; calculate each level one by one. The security risk assessment value of the risk level u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 陆嘉杰
Owner BEIJING KNOWNSEC INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products