Acquisition and audit analysis method and device for safety test data

A technology of security testing and analysis methods, applied in the field of security test data acquisition and audit analysis, can solve the problems of low security, inability to know the testing behavior of third-party testers, and inability to know, so as to achieve the effect of improving security

Active Publication Date: 2018-12-07
北京中金安服科技有限公司
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the process of implementing the present invention, the inventor found the following technical problems in the prior art, because after the third-party testers conduct security tests on the enterprise's information system, they will only provide the test results of the security test to the enterprise, although According to the security test results, the enterprise can improve the potential threat points in the information system to ensure that the enterprise business is not harmed by information technology risks in the process of operation, but the enterprise cannot know that the third-party testers are in the security The specific testing behavior during the testing process, so that it is impossible to know whether the third-party testers have performed illegal operations such as obtaining sensitive data of the enterprise and retaining backdoors in the information system during the security testing process, which in turn leads to the failure of the security testing process of the information system of the enterprise. less secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Acquisition and audit analysis method and device for safety test data
  • Acquisition and audit analysis method and device for safety test data
  • Acquisition and audit analysis method and device for safety test data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] Hereinafter, exemplary embodiments of the present disclosure will be described in more detail with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure can be implemented in various forms and should not be limited by the embodiments set forth herein. On the contrary, these embodiments are provided to enable a more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0072] The embodiment of the present invention provides a method for obtaining and auditing and analyzing safety test data, such as figure 1 As shown, the method includes:

[0073] 101. Receive a security test request sent by a terminal device.

[0074] Among them, the security test request contains the identity information corresponding to the terminal device. It should be noted that the execution subject of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an acquisition and audit analysis method and device for safety test data, relates to the technical field of the internet, and improves safety of a process of carrying out a safety test on an information system of an enterprise. The method disclosed by the invention comprises the steps of: receiving a safety test request sent by terminal equipment, wherein the safety test request comprises identity information corresponding to the terminal equipment; according to the identity information, determining a virtual network card corresponding to the terminal equipment; by monitoring the virtual network card, acquiring safety test traffic corresponding to the terminal equipment; and carrying out audit analysis processing on the safety test traffic to acquire safety test data corresponding to the terminal equipment, wherein the safety test data is used for quantizing the safety test process corresponding to the terminal equipment and auditing a high-risk behavior operation corresponding to the terminal equipment. The acquisition and audit analysis method and device are applicable to the process that a third-party tester carries out the safety test on the informationsystem of the enterprise.

Description

Technical field [0001] The invention relates to the field of Internet technology, and in particular to a method and device for acquiring and auditing and analyzing safety test data. Background technique [0002] With the increasing development of Internet technology, information technology has become an important means for major enterprises to carry out business innovation and layout business strategies, and the business development of enterprises is increasingly dependent on information technology. However, in the process of business operations of an enterprise, factors such as technical loopholes or management deficiencies will cause the enterprise’s business to be harmed by information technology risks. Because information technology risks have the characteristics of wide coverage, high destructive power, and strong concealment, the information Technological risks can cause enterprise business to be paralyzed in an instant, so how to ensure that enterprise business avoids the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/145H04L41/147H04L63/0272H04L63/0815H04L63/14H04L63/1466H04L63/1475
Inventor 舒铁阳
Owner 北京中金安服科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products