Security risk identification method and device, equipment and storage medium

A security risk and risk identification technology, applied in the network field, can solve problems such as company losses, and achieve the effect of accurate analysis results, convenient risk control and management optimization

Pending Publication Date: 2019-07-26
SANGFOR TECH INC
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, employees upload and distribute internal company data through email or post, causing certain losses to the company; another example, employees print documents that contain sensitive information, or access and obtain data outside their own authority through various methods equipment, data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security risk identification method and device, equipment and storage medium
  • Security risk identification method and device, equipment and storage medium
  • Security risk identification method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] Employees of the company walk into the workplace every day until they leave after get off work. During this period, they will use various access control systems, access various servers and systems, access the Internet, enter various work-related areas, print files, use peripherals such as mobile storage devices, and use other Office equipment or IoT devices. These behaviors can be divided into three scenarios, namely accessing the Internet, accessing the intranet, and accessing office areas and devices. Security risks exist in all three scenarios, such as leaking, stealing, and sabotage. The security risks in these scenarios are all based on "people", and the current technical solutions only analyze the behavior of a person in one or part of the scenarios when analyzing whether there is a security risk in a person's behavior and trends, and do not Comprehensive analysis of the person's behavior in all scenarios, therefore, misjudgment is prone to occur. For example, em...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security risk identification method and device, equipment and a storage medium. The method comprises the following steps of: obtaining log data reported by other equipment orplatforms, and comprehensively analyzing behavior data of the same user under different scenes, such as an Internet access scene, an intranet access scene, an office area and an equipment access scene, so as to obtain risk information of each user; and finally obtaining a risk identification result according to the risk information of each user. According to the system, the safety management platform is used for collecting user behaviors under various scenes in the system, the safety risk of each user can be analyzed from the overall perspective, the obtained analysis result is more accurate,potential safety risks can be found in advance, and companies can conveniently carry out risk management and control and management optimization.

Description

technical field [0001] The invention belongs to the field of network technology, and in particular relates to a security risk identification method, device, equipment and storage medium. Background technique [0002] With the rapid development of network technology, almost every enterprise and organization cannot do without the network. Every day, employees need to access various data that matches their positions, use various office equipment and even IoT devices, for example, use various access control systems, access various servers and systems, access the Internet, and enter various work-related areas. Use various peripherals such as printers, scanners, and removable storage devices. [0003] For enterprises and organizations, employee behaviors may pose security risks, such as leaking, stealing, and sabotage. For example, employees upload and distribute internal company data through email or post, causing certain losses to the company; another example, employees print ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q10/06
CPCG06Q10/0635
Inventor 杨金柱
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products