Host security state management method, device and terminal equipment
A technology of security status and management methods, applied in computer security devices, electrical digital data processing, instruments, etc., can solve the problems of large workload and high labor cost of the host, and achieve the effect of reducing labor costs and workload.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] figure 1 It shows a schematic flowchart of the first host security state management method provided by the embodiment of the present application, and the details are as follows:
[0029] Step S11 , acquiring operation data of the host computer in the industrial control system, the operation data including: SCADA software operation information or / and protocol open information of the host computer or / and log information of the host computer.
[0030] The host of the industrial control system includes: a host running data acquisition and supervisory control (Supervisory ControlAnd Data Acquisition, SCADA) software, or / and a conventional host, or / and a programmable logic controller (Programmable Logic Controller, PLC) proxy host , the regular host means a host that neither runs SCADA software nor is a PLC proxy host in the industrial control system.
[0031] Optionally, the running data further includes: host resource usage information of the host, and the host resource us...
Embodiment 2
[0055] figure 2 It shows a schematic flowchart of the second host security state management method provided by the embodiment of the present application. Step S22 of this embodiment is the same as step S11 of Embodiment 1, and will not be repeated here:
[0056] Step S21 , acquiring operation data of hosts within the security baseline in the industrial control system, where the hosts within the security baseline include hosts in the industrial control system that implement specified functions.
[0057] Optionally, before the step S21, the entire industrial control system is scanned to determine the surviving hosts in the industrial control system; the security baseline is determined according to the function of the surviving hosts; and the security baseline is determined according to the security baseline. Hosts within the baseline.
[0058] Optionally, the scanning the entire industrial control system, and determining the surviving hosts in the industrial control system inc...
Embodiment 3
[0068] Corresponding to Embodiment 1 and Embodiment 2 above, image 3 A schematic structural diagram of an apparatus for managing a host security state provided by an embodiment of the present application is shown, and for convenience of description, only parts related to the embodiment of the present application are shown.
[0069] The host security state management device includes: an operation data acquisition unit 31 and a security state evaluation data acquisition unit 32 .
[0070] The running data obtaining unit 31 is used to obtain the running data of the host computer in the industrial control system, and the running data includes: SCADA software running information or / and protocol opening information of the host computer or / and log information of the host computer.
[0071] Optionally, the running data further includes: host resource usage information of the host, and the host resource usage information includes: central processing unit (Central Processing Unit, CPU)...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


