Unlock instant, AI-driven research and patent intelligence for your innovation.

A closed-loop network security monitoring method and system for security threat events

A technology for network security and security events, applied in the field of closed-loop network security supervision methods and systems, can solve the problem of single network security supervision means, inability to accurately supervise the handling of network security threat events, network security handling capabilities, and inability to grasp regional network security. Comprehensive level capability and other issues, to achieve the effect of ensuring closed-loop processing, improving efficiency and the safety level of the jurisdiction, quantifying the status quo and processing situation

Active Publication Date: 2022-03-25
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problems in the prior art, the means of network security supervision is single, and it is impossible to accurately monitor the handling of network security threat events and the regional network security handling capabilities, and it is impossible to grasp the comprehensive level of regional network security capabilities. The present invention provides an optimized The closed-loop network security supervision method and system for security threat incidents, through the organic integration of security detection capabilities, regional network security personnel, and regional information systems, continuously discovers security threats, assists and urges regions to rectify threats, thereby improving regional information System security level and the security level of network security personnel in the region, thereby greatly improving the level of regional network security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A closed-loop network security monitoring method and system for security threat events

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be described in further detail below in conjunction with the examples, but the protection scope of the present invention is not limited thereto.

[0030] The present invention relates to a closed-loop network security supervision method for security threat events, wherein the security threat refers to information systems or key infrastructures in the network area, including security loopholes in websites or systems, which may be gray industrial chain, etc.) to cause harm to the information system and respond to the level of network security in the region.

[0031] The method includes the following steps.

[0032] Step 1: The security detection module performs security detection on the user's website.

[0033] In the step 1, the safety detection includes:

[0034] Conduct periodic security vulnerability and security incident detection on the website;

[0035] According to the type of threat event, carry out special security detection, and tr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a closed-loop network security supervision method and system for security threat events. When a security detection module finds a security threat event and needs to be notified, it sets the corresponding status label code and records it, generates alarm information and sends it to the alarm contact, and the alarm contact The person disposes, submits, and modifies the event status label code to be reviewed, and the network security regulatory agency will review and confirm whether the disposal is effective. If not, continue to notify the rectification, and track the incidents that are handled using network access control. Other effective disposals will complete the process. Combining with the particularity of network security, the present invention constructs a closed-loop of discovery, notification, disposal, and tracking management of security threat events, and continuously tracks security threat events to ensure closed-loop processing and correct repair of events. The process data can be quantified and assessed, and the lower-level supervision can be effectively quantified The current situation and handling of security threat incidents of institutions, increase the means of network security supervision, and continuously improve the efficiency of network security supervision and the security level of the jurisdiction.

Description

technical field [0001] The present invention relates to the transmission of digital information, such as the technical field of telegram communication, and in particular to a closed-loop network security supervision method and system for security threat events. Background technique [0002] The application of information technology has profoundly affected and changed people's production methods and lifestyles, promoted the progress and development of all aspects of society, and played an important role in promoting and supporting various fields of the national economy. With the continuous improvement of the level of information application and the continuous expansion of the scope, the problem of network information security has become increasingly prominent, seriously affecting national security, social stability, and economic order. The national level has also paid more and more attention to this issue, and has issued a series of policies in recent years, requiring various...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416
Inventor 陈建勇范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD