Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, system, device and storage medium for continuous security monitoring of network assets

A network asset and security monitoring technology, applied in the field of Internet security, can solve problems such as high security risks on the Internet platform and difficult Internet platform security risk monitoring, and achieve the effect of ensuring timeliness and comprehensive monitoring information

Active Publication Date: 2022-01-18
SANGFOR TECH INC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, with the development of the Internet-based business of large organizations and the continuous increase in business complexity, the security of Internet services is also facing serious challenges. Many Internet business security assessment methods and detection methods formed during the early Internet development It is difficult to effectively monitor the security risks of the current Internet platforms, that is, the traditional Internet business security assessment methods and detection methods have been difficult to adapt to the security requirements of the current Internet development status, resulting in high security risks in many Internet platforms. Security Risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system, device and storage medium for continuous security monitoring of network assets
  • Method, system, device and storage medium for continuous security monitoring of network assets
  • Method, system, device and storage medium for continuous security monitoring of network assets

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0076] The embodiment of the present invention discloses a method for continuous security monitoring of network assets, see figure 1 As shown, the method includes:

[0077] Step S11: Continuously monitor the exposed shadow assets on the target Internet platform, and automatically compare and analyze the currently monitored shadow assets and historical shadow assets to obtain changes in shadow assets.

[0078] It can be understood that, in this embodiment, con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a method, system, device and storage medium for continuous security monitoring of network assets. The method includes: continuously monitoring the exposed shadow assets in the target Internet platform, and comparing the currently monitored shadow assets with the historical shadow assets. Assets are automatically compared and analyzed to obtain the changes in shadow assets; the security threats existing in the target Internet platform are continuously monitored, and the security threats are obtained through automatic comparison and analysis of the currently monitored security threats and historical security threats. Changes. The monitoring information obtained in this application is more comprehensive, and it can ensure that the obtained shadow assets and security threats are dynamically updated in real time, ensuring the timeliness of the information. In addition, the shadow can be determined through automatic comparison and analysis. Changes in assets and security threats enable users to be informed of new security risks in a timely manner.

Description

technical field [0001] The invention relates to the technical field of Internet security, in particular to a method, system, equipment and storage medium for continuous security monitoring of network assets. Background technique [0002] At present, with the development of the Internet-based business of large organizations and the continuous increase in business complexity, the security of Internet services is also facing serious challenges. Many Internet business security assessment methods and detection methods formed during the early Internet development It is difficult to effectively monitor the security risks of the current Internet platforms, that is, the traditional Internet business security assessment methods and detection methods have been difficult to adapt to the security requirements of the current Internet development status, resulting in high security risks in many Internet platforms. Security Risk. [0003] To sum up, it can be seen that how to effectively m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1408H04L63/1433H04L63/1441H04L63/205H04L63/30
Inventor 庞思铭周欣王振兴王朋涛
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products