Risk assessment method and system

A risk assessment system and risk assessment technology, applied in the field of risk assessment methods and systems, can solve problems such as no better solution

Inactive Publication Date: 2018-11-23
JIANGSU MANYUN SOFTWARE TECH CO LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when a network intrusion event occurs, there is currently no good solution for

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk assessment method and system
  • Risk assessment method and system
  • Risk assessment method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the specific implementation manners of the present invention will be described below with reference to the accompanying drawings. Obviously, the accompanying drawings in the following description are only some embodiments of the present invention, and those skilled in the art can obtain other accompanying drawings based on these drawings and obtain other implementations.

[0061] In order to make the drawing concise, each drawing only schematically shows the parts related to the present invention, and they do not represent the actual structure of the product. In addition, to make the drawings concise and easy to understand, in some drawings, only one of the components having the same structure or function is schematically shown, or only one of them is marked. Herein, "a" not only means "only one", but also means "more than one".

[0062] Such as f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a risk assessment method and a risk assessment system, wherein the method comprises: responding to a timing task that includes a task startup time and at least one target infrastructure; acquiring a preset security baseline policy corresponding to the target infrastructure, wherein the security baseline policy includes at least one security baseline; invoking and enforcingthe security baseline policy to obtain a security baseline value for each security baseline in the target infrastructure; calculating a security health value for the target infrastructure based on thesecurity baseline value; and performing a risk assessment on the target infrastructure based on the security health value. By quantifying a security health value through the security status of the target infrastructure, the invention implements real-time monitoring of the operational status of the target infrastructure, and is capable of quickly locating security threat points in the infrastructure when security events occur in the network.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a risk assessment method and system. Background technique [0002] With the continuous development of information technology, information security incidents are showing an increasing trend, such as using Trojan horse virus to steal user sensitive information, using phishing to conduct network fraud, etc., which bring more and more losses to people, so information security has become an important aspect of enterprise information The focus of cultural construction. [0003] In this process, security operation and maintenance personnel generally formulate security specifications and conduct security checks on the entire network equipment in order to block security incidents before they occur. The security baseline is a product that checks the compliance of the entire network equipment, and specifies the most basic security requirements that an information syste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08G06F21/55
CPCG06F21/55H04L63/1441H04L63/20H04L63/30H04L67/2866
Inventor 谢敏宋寅
Owner JIANGSU MANYUN SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products