Unlock instant, AI-driven research and patent intelligence for your innovation.

Closed loop type network security supervision method and system for security threat event

A technology for network security and security events, which is applied in the field of closed-loop network security supervision methods and systems, and can solve the problem of inability to accurately supervise the handling of cybersecurity threat events. Comprehensive level capability and other issues to achieve the effect of improving efficiency and the safety level of the jurisdiction, ensuring closed-loop processing, and quantifying the status quo and processing situation

Active Publication Date: 2019-04-23
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problems in the prior art, the means of network security supervision is single, and it is impossible to accurately monitor the handling of network security threat events and the regional network security handling capabilities, and it is impossible to grasp the comprehensive level of regional network security capabilities. The present invention provides an optimized The closed-loop network security supervision method and system for security threat incidents, through the organic integration of security detection capabilities, regional network security personnel, and regional information systems, continuously discovers security threats, assists and urges regions to rectify threats, thereby improving regional information System security level and the security level of network security personnel in the region, thereby greatly improving the level of regional network security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Closed loop type network security supervision method and system for security threat event

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be described in further detail below in conjunction with the examples, but the protection scope of the present invention is not limited thereto.

[0030] The present invention relates to a closed-loop network security supervision method for security threat events, wherein the security threat refers to information systems or key infrastructures in the network area, including security loopholes in websites or systems, which may be gray industrial chain, etc.) to cause harm to the information system and respond to the level of network security in the region.

[0031] The method includes the following steps.

[0032] Step 1: The security detection module performs security detection on the user's website.

[0033] In the step 1, the safety detection includes:

[0034] Conduct periodic security vulnerability and security incident detection on the website;

[0035] According to the type of threat event, carry out special security detection, and tr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a closed loop type network security supervision method and system for a security threat event. When a security detection module finds the security threat event and needs to notify, a corresponding state tag code is set and recording is carried out; alarm information is generated and sent to an alarm contact; the alarm contact disposes and submits the event state tag code and modifies the event state tag code into a to-be-audited state; a network security supervision mechanism audits to confirm whether the event state tag code is effectively disposed; if no, the networksecurity supervision mechanism continuously notifies to rectify; and events disposed by adopting network access control are directionally tracked, and other effective disposes are completed accordingto flow. According to the invention, the particularity of network security is combined; a closed loop of finding, notification, dispose and tracking management is constructed for the security threatevent; the security threat event is continuously tracked so as to ensure closed-loop dispose and correct repair of the event; process data can be quantized and can be examined; a current situation anda dispose condition of the security threat event of a subordinate supervision mechanism are effectively quantized; network security supervision means are increased; and the network security supervision efficiency and the jurisdiction security level are continuously promoted.

Description

technical field [0001] The present invention relates to the transmission of digital information, such as the technical field of telegram communication, and in particular to a closed-loop network security supervision method and system for security threat events. Background technique [0002] The application of information technology has profoundly affected and changed people's production methods and lifestyles, promoted the progress and development of all aspects of society, and played an important role in promoting and supporting various fields of the national economy. With the continuous improvement of the level of information application and the continuous expansion of the scope, the problem of network information security has become increasingly prominent, seriously affecting national security, social stability, and economic order. The national level has also paid more and more attention to this issue, and has issued a series of policies in recent years, requiring various...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416
Inventor 陈建勇范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD