A closed-loop network security monitoring method and system for security threat events
A technology for network security and security events, applied in the field of closed-loop network security supervision methods and systems, can solve the problem of single network security supervision means, inability to accurately supervise the handling of network security threat events, network security handling capabilities, and inability to grasp regional network security. Comprehensive level capability and other issues, to achieve the effect of ensuring closed-loop processing, improving efficiency and the safety level of the jurisdiction, quantifying the status quo and processing situation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] The present invention will be described in further detail below in conjunction with the examples, but the protection scope of the present invention is not limited thereto.
[0030] The present invention relates to a closed-loop network security supervision method for security threat events, wherein the security threat refers to information systems or key infrastructures in the network area, including security loopholes in websites or systems, which may be gray industrial chain, etc.) to cause harm to the information system and respond to the level of network security in the region.
[0031] The method includes the following steps.
[0032] Step 1: The security detection module performs security detection on the user's website.
[0033] In the step 1, the safety detection includes:
[0034] Conduct periodic security vulnerability and security incident detection on the website;
[0035] According to the type of threat event, carry out special security detection, and tr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
