Data security protection method and device

A data security and data technology, applied in the field of data security, can solve problems such as single evaluation index and unreasonable evaluation process, and achieve the effect of solving single evaluation index

Active Publication Date: 2018-05-29
北京明朝万达科技股份有限公司
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method uses the fuzzy membership degree theory to reasonably quantify the qualitative indicators, which solves the problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security protection method and device
  • Data security protection method and device
  • Data security protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] Such as figure 1 As shown, the content of the middle box part is the basic elements of risk assessment, and the content of the oval part is the attributes related to these elements. Risk assessment revolves around the basic elements of assets, threats, vulnerabilities, and security measures. In the process of evaluating the basic elements, it is necessary to fully consider business strategies, asset values, security requirements, security incidents, and residual risks related to these basic elements. of various attributes. The following pairs figure 1 The content in is explained.

[0073] Assets are valuable, and the higher the organization's business strategy relies on assets, the greater the value of assets;

[0074] Risks are triggered by threats, and the more threats an asset faces, the greater the risk, which may evolve into a security incident;

[0075] The vulnerability of assets may expose the value of assets, and the more weaknesses an asset has, the greate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data security protection method and device. The method comprises the following steps that factors including the data asset Z, the data threat T and the data vulnerability V which are involved in data security risks are determined; a data risk degree matrix R is determined according to the data asset Z, the data threat level T and the data vulnerability level V; a weight vector group G related to the data asset Z, the data threat T and the data vulnerability V is determined; the data risk level membership level Y is determined according to the data risk matrix and theweight vector group, wherein Y=G*R; and a corresponding data protection scheme is determined according to the risk level membership degree. According to the technical scheme, the problems that in an existing network security risk assessment method, the assessment index is single, and the assessment process is unreasonable are well solved, and therefore the more targeted data protection scheme is conveniently adopted.

Description

technical field [0001] The invention relates to the field of data security, in particular to a network security risk assessment method and device based on vector matrix product. Background technique [0002] The important concepts involved in the present invention are explained according to the definition of ITSEC: [0003] Assets: Assets are valuable information or resources belonging to an organization. This article refers to the information and information carriers related to the information processing of the evaluation object. [0004] Risk (Risk): The possibility that the threat subject uses the vulnerability of the asset to cause loss or damage to it. [0005] Threat: The possibility of unanticipated events causing harm to a system or organization. [0006] Vulnerability (Vulnerabmty): refers to a system defect that can be exploited by threats, which can increase the possibility of the system being attacked. [0007] With the earth-shaking development of information...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/101H04L63/1416H04L63/1433H04L63/205
Inventor 戚清海喻波王志海安鹏
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products