Unlock instant, AI-driven research and patent intelligence for your innovation.

Safety risk assessment method, device, equipment and computer-readable storage medium

A technology with security risks and risks, applied in the computer field, can solve problems such as the complexity of cyberspace, and achieve comprehensive and accurate calculation effects

Active Publication Date: 2021-10-26
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, for network risk assessment, one of the widely recognized solutions is to quantify network risk. Its main idea is to use a number to measure the network risk of an enterprise. Existing technologies generally consider the impact on network security in the process of quantification. Various factors, such as the frequency of reports of exploited security vulnerabilities, the frequency of reports of domain name hijacking, the value of the assets in cyberspace, etc.; however, with the continuous advancement of information technology in various industries, cyberspace has become more and more complex. The simple method of quantifying cyber risk is no longer applicable, especially for enterprises in the information age

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety risk assessment method, device, equipment and computer-readable storage medium
  • Safety risk assessment method, device, equipment and computer-readable storage medium
  • Safety risk assessment method, device, equipment and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0026] In order to better understand the security risk assessment method, device and equipment provided by the embodiment of the present invention, the overall architecture of the security risk assessment in the embodiment of the present invention will be described below, as follows figure 1 The overall architecture diagram of the security risk assessment method provided by the embodiment of the present invention is shown. The security risk assessment device first c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a security risk assessment method, including: collecting risk data for security risk assessment; in the case that the collected risk data does not reach the threshold, counting the frequency of security event items occurring in the security type based on the risk data and The risk value of the security event item determines the security risk loss value of the security type; calculates the security risk quantification value according to the security risk loss value of the security type and the defined security risk loss value; when the collected risk data reaches the threshold value, Input the collected risk data into the trained machine learning model, and calculate the quantified value of security risk; adopt the present invention to calculate the value of security risk loss according to the situation, and in the early stage, the initial value of security risk can be manually defined through expert experience, and the security risk can be calculated The loss value, in the later stage, automatically calculates the security risk loss value through machine learning, which can more comprehensively and accurately calculate the security risk quantification value of the enterprise.

Description

technical field [0001] The present invention relates to the field of computers, in particular to a security risk assessment method, a security risk assessment device, a security risk assessment device and a computer-readable storage medium. Background technique [0002] Under the background of today's Internet of Everything, various fields are rapidly promoting digital transformation. Enterprises from all walks of life have basically connected to this intelligent environment in various ways. More and more data, services, computing, and equipment Flooding into the virtual cyberspace, enterprises generally face security risks such as attacks, detection, and theft from cyberspace. [0003] In recent years, all parties have been clearly aware of the threat of cyber risk, and have gradually launched or increased research on cyber risk assessment and control. For example, for network risk assessment, one of the widely recognized solutions is to quantify network risk. Its main ide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06Q10/06
CPCG06Q10/0635H04L63/1416H04L63/1425H04L2463/144
Inventor 毛婷伟梁玉洪春华吴楚王泉
Owner TENCENT TECH (SHENZHEN) CO LTD