Method for processing network security event, related device and storage medium
A technology for network security and security incidents, applied to a method for dealing with network security incidents, related devices and storage media, can solve problems such as missed reports and false reports of network security events, so as to avoid false positives and negative reports, improve The Effects of Network Security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] The embodiment of the present invention provides a method for processing network security incidents, see figure 1 , the method includes:
[0033] S101. Verify the authenticity of the network security incidents discovered through monitoring, and formulate corresponding incident handling requirements for the network security incidents that pass the verification;
[0034] S102. Distribute the information of the network security incident and the corresponding disposal requirements to the affected relevant units, and receive the event feedback information from the relevant units, analyze the event feedback information, and determine whether the network security incident has been obtained Effectively dispose of, and end after it is determined that the network security incident has been effectively disposed of.
[0035] The embodiments of the present invention formulate corresponding event processing requirements for all monitored real network security events, thereby avoidin...
Embodiment 2
[0081] An embodiment of the present invention provides a device for processing network security events, see image 3 , the device consists of:
[0082] The verification unit is used to verify the authenticity of the network security incidents discovered by monitoring, and formulate corresponding incident handling requirements for the network security incidents that pass the verification;
[0083] A processing unit, configured to distribute information about network security incidents and corresponding disposal requirements to affected relevant units, receive event feedback information from the relevant units, analyze the event feedback information, and judge the network security incidents Whether it has been effectively dealt with, and after it is determined that the network security incident has been effectively dealt with, end.
[0084] The embodiments of the present invention formulate corresponding event processing requirements for all monitored real network security even...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


