Safety test data acquisition and audit analysis method and device

A technology of security testing and analysis methods, applied in the field of security test data acquisition and audit analysis, can solve the problems of low security, inability to know, and inability to know the testing behavior of third-party testers, so as to achieve the effect of improving security

Active Publication Date: 2021-08-13
北京中金安服科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the process of implementing the present invention, the inventor found the following technical problems in the prior art, because after the third-party testers conduct security tests on the enterprise's information system, they will only provide the test results of the security test to the enterprise, although According to the security test results, the enterprise can improve the potential threat points in the information system to ensure that the enterprise business is not harmed by information technology risks in the process of operation, but the enterprise cannot know that the third-party testers are in the security The specific testing behavior during the testing process, so that it is impossible to know whether the third-party testers have performed illegal operations such as obtaining sensitive data of the enterprise and retaining backdoors in the information system during the security testing process, which in turn leads to the failure of the security testing process of the information system of the enterprise. less secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety test data acquisition and audit analysis method and device
  • Safety test data acquisition and audit analysis method and device
  • Safety test data acquisition and audit analysis method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0072] Embodiments of the present invention provide a method for acquiring and auditing analysis of security test data, such as figure 1 As shown, the method includes:

[0073] 101. Receive a security test request sent by a terminal device.

[0074] Wherein, the security test request includes identity information corresponding to the terminal device. It should be noted that the execution subject of the embodiment of the present i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety test data acquisition and audit analysis method and device, relates to the technical field of the Internet, and improves the safety of the safety test process of an enterprise's information system. The method of the present invention includes: receiving a security test request sent by a terminal device, wherein the security test request includes the identity information corresponding to the terminal device; determining the virtual network card corresponding to the terminal device according to the identity information; The virtual network card obtains the security test traffic corresponding to the terminal device; audits and analyzes the security test traffic to obtain security test data corresponding to the terminal device, and the security test data is used to quantify the terminal device The corresponding security testing process and the auditing of high-risk behavior operations corresponding to the terminal equipment. The invention is applicable to the process of third-party testers conducting security tests on enterprise information systems.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method and device for acquiring and auditing analysis of safety test data. Background technique [0002] With the increasing development of Internet technology, information technology has become an important means for major enterprises to carry out business innovation and layout business strategy, and the business development of enterprises is increasingly dependent on information technology. However, in the process of enterprise business operation, factors such as technical loopholes or management defects will cause enterprise business to be harmed by information technology risks. Because information technology risks have the characteristics of wide coverage, high destructive power, and strong concealment, information Technological risks can paralyze the business of an enterprise in an instant, so how to ensure that the business of the enterprise is not harmed by informat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/145H04L41/147H04L63/0272H04L63/0815H04L63/14H04L63/1466H04L63/1475
Inventor 舒铁阳
Owner 北京中金安服科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products