Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for centralized management and control of data security

A technology for data security and security control, applied in the field of data security, to achieve effective collaborative protection and strong research and judgment capabilities

Active Publication Date: 2019-02-26
北京明朝万达科技股份有限公司
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the above problems, the embodiment of the present invention provides a centralized management and control method applied to data security to solve the defects existing in the existing basic security protection system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for centralized management and control of data security
  • A method and system for centralized management and control of data security
  • A method and system for centralized management and control of data security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0041] At present, the diversification of application environments, the shortening of development iteration cycles, and the compression of security testing have led to a sharp increase in the number of application vulnerabilities, and the continuous expansion of security boundaries has increased the difficulty of data security protection. Specifically, the starting points of application development and security protection are different. Application development focuses on function realization, and considers limited or no security issues. Therefore, the protection of the application itself is becoming more and more fragile, and there are more and more application vulnerabilities. In this mode, it is difficult to find vulnerabilities....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and system for centralized management and control of data security are provided in that embodiment of the present invention, in accordance with that present invention, the method is applied to a data security centralized management and control system, The data security centralized management and control system is connected with at least one security management and control system. The method comprises the following steps: selecting specific data from data assets as target data and sensing to obtain the data security status of the target data, wherein, the target data is selected according to the data security protection requirements; Analyzing and evaluating the data security state to generate an analysis and evaluation result; At least one security management and control system access to that target data is triggered to perform security management and control on the target data accord to the specific policy matched according to the analysis and evaluation result. The embodiment of the invention not only supports the protection when and after the attack and malicious behavior occurs, but also can predict and alert before the attack and malicious behavior occurs.

Description

technical field [0001] The present invention relates to the technical field of data security, in particular to a data security centralized management and control method, a data security centralized management and control system, an electronic device and a readable storage medium. Background technique [0002] Under the background of the transformation from the era of information technology to the era of data technology, data has the internal driving force of "internal leakage and external theft" according to its unique value, and is in a high-risk state of easy leakage and abuse, and data security protection is facing severe challenges challenge. [0003] "Passive defense" is the current mainstream way of security protection, and one of its cores is the need to obtain vulnerability or threat information for definition. Specifically, the current data security protection mainly relies on the basic security protection system. The basic security protection system faces the net...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57H04L29/06
CPCG06F21/577G06F2221/034H04L63/1425H04L63/1433H04L63/1441
Inventor 宋博韬喻波王志海魏力
Owner 北京明朝万达科技股份有限公司