Closed loop type network security supervision method and system for security threat event
A technology for network security and security events, which is applied in the field of closed-loop network security supervision methods and systems, and can solve the problem of inability to accurately supervise the handling of cybersecurity threat events. Comprehensive level capability and other issues to achieve the effect of improving efficiency and the safety level of the jurisdiction, ensuring closed-loop processing, and quantifying the status quo and processing situation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] The present invention will be described in further detail below in conjunction with the examples, but the protection scope of the present invention is not limited thereto.
[0030] The present invention relates to a closed-loop network security supervision method for security threat events, wherein the security threat refers to information systems or key infrastructures in the network area, including security loopholes in websites or systems, which may be gray industrial chain, etc.) to cause harm to the information system and respond to the level of network security in the region.
[0031] The method includes the following steps.
[0032] Step 1: The security detection module performs security detection on the user's website.
[0033] In the step 1, the safety detection includes:
[0034] Conduct periodic security vulnerability and security incident detection on the website;
[0035] According to the type of threat event, carry out special security detection, and tr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
