Network asset management and loophole handling system

A network asset and vulnerability technology, applied in transmission systems, electrical digital data processing, instruments, etc., can solve the problems of incomplete grasp of information asset information, difficulty in timely and accurate discovery of vulnerabilities and repairs, etc.

Inactive Publication Date: 2018-10-26
广东省信息安全测评中心
View PDF6 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The information of information assets is not fully grasped, and it is difficult to find and repair vulnerabilities in a timely and accurate manner

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network asset management and loophole handling system
  • Network asset management and loophole handling system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Embodiments of the present invention will be described in detail below. It should be emphasized that the following description is only exemplary and not intended to limit the scope of the invention and its application.

[0049] refer to figure 1 , in one embodiment, a system for network asset management and vulnerability management includes a network asset information collection subsystem, and the network asset information collection subsystem includes: a basic information collection module configured to discover networked hosts and perform host Fingerprint identification of the operating system, to detect the type of operating system of the remote target host; an application component fingerprint collection module, which is configured to discover one or more of the version, service port, and protocol interaction characteristics of the network application or component Application program or component fingerprint information; vulnerability awareness module, which is con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network asset management and loophole handling system, comprising a network asset information collection subsystem, wherein the network asset information collection subsystem comprises a basic information collection module, an application component fingerprint collection module, a vulnerability perceptive module and a loophole handling and repairing tool module; the basic information collection module finds a networked host and carries out fingerprint identification on an operating system of the host, so as to detect a type of the operating system of a remote targethost; the application component fingerprint collection module finds one kind or multiple kinds of fingerprint information, including versions, service ports and protocol interaction features of network application programs or components, of the network application programs or components; the vulnerability perceptive module carries out perception and analysis on vulnerability of an application system and the networked host and finds possible loopholes in the networked host as well as a system, services and application components thereof; and the loophole handling and repairing tool module carries out loophole handling and / or repairing on the found loopholes in the networked host as well as the system, services and application components thereof by virtue of a loophole handling personnel operation and / or automatic operation way. The network asset management and loophole handling system provided by the invention can rapidly and accurately find and timely repair security loopholes of an information system.

Description

technical field [0001] The invention relates to information asset security, in particular to a network asset management and vulnerability management system. Background technique [0002] Information system cyberspace is composed of numerous nodes, each node is an IT asset (or information asset) connected to the network, and information assets include host operating systems, network devices, security devices, databases, middleware, and application components. Information assets are the most basic and important carrier in information security management. With the continuous growth of the internal business of the enterprise and the rapid development of business informatization, various business support platforms and management systems are becoming more and more complex. As the resources become richer and richer, the asset management work brought to administrators becomes more and more difficult. Over time, a large number of unowned assets and zombie assets have been generated...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/57
CPCG06F21/577H04L63/1433H04L63/20
Inventor 陈志华王文佳麦浩镔吉威炎罗成威刘洋
Owner 广东省信息安全测评中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products