Business data security risk identification method and system

A security risk and business data technology, applied in the computer field, can solve problems such as social hazards, triggering social events, and endangering the business development of enterprises, and achieve the goal of strengthening strength, strong pertinence and directivity, and refined management strategies and granularity Effect

Inactive Publication Date: 2019-07-05
北京国舜科技股份有限公司
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Data management, use authorization control, and protection risks of business use flow are all very complex
Furthermore, in the era of big data, one of the manifestations of data application security risks is within the enterprise, because the failure of big data application security risk management and control will endanger the development of enterprise business on the one hand, and even trigger social incidents on the other hand, causing considerable great social harm
Therefore, internal data security risk management and control of enterprises is very important, while traditional security risk assessment methods tend to ignore technical analysis for various reasons, and more focus on strengthening security management from the internal control system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Business data security risk identification method and system
  • Business data security risk identification method and system
  • Business data security risk identification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0027] refer to figure 1 , figure 1 It is a schematic flowchart of a business data security risk identification method provided by an embodiment of the present invention, and the provided method includes:

[0028] S1, according to the data classification and classification information of the information system, the network topology diagram and t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a business data security risk identification method and system, and the method comprises the steps: obtaining a business data flow topological graph accordingto the data classification grading information, a network topological graph and security domain division information of an information system; carrying out portraying on an attack link according to network attack mode information and the business data flow topological graph to obtain an attack link portraying; and analyzing the network attack link according to the attack link portrait to obtain asecurity risk identification result. The method and the system have high targeting performance and directivity. Meanwhile, the strength of data security management in the information system is enhanced, the management strategy and granularity are refined, the requirement for data security management in the big data era is better met, a security guarantee is provided for security management of dynamic service data of the big data platform, and meanwhile a foundation is provided for subsequent security situation analysis of the big data security platform.

Description

technical field [0001] The embodiments of the present invention relate to the field of computer technology, and in particular to a method and system for identifying business data security risks. Background technique [0002] Security risk assessment is to use scientific methods and means from the perspective of risk management to systematically analyze the threats and vulnerabilities faced by networks and information systems, assess the degree of harm that may be caused by security incidents, and propose targeted measures. Protective countermeasures and corrective actions against threats. The risk assessment work runs through the entire life cycle of the information system, including the planning phase, design phase, implementation phase, operation phase, and abandonment phase. [0003] The security risk assessment is mainly based on the "Information Security Risk Assessment Specification", ISO / IEC 13335 IT Security Management Guidelines, BS7799-1 (ISO / IEC 17799) risk manag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 胡云汤志刚姜强
Owner 北京国舜科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products