Automatic configuration management system and method for network security
A technology of automatic configuration management and network security, which is applied in the field of automatic configuration management system of network security, can solve problems such as low security requirements, low level of security protection, and inability to meet the needs of enterprise network information security, so as to improve configuration management efficiency effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0068] Embodiment one, as figure 1 As shown, an automatic configuration management system for network security includes an initialization module, a security monitoring module, a security assessment module, a security decision module, a configuration module and a configuration library:
[0069] The initialization module is used to assign the initial trust degree of each monitoring object in the monitoring area; wherein, the monitoring object includes equipment, system and software;
[0070] The safety monitoring module is configured to obtain a one-to-one corresponding safety state value and safety demand value of each monitoring object in the monitoring area;
[0071] The safety evaluation module is used to evaluate and analyze the safety coefficients of all monitoring objects according to all initial trust degrees, all safety state values and all safety demand values of all monitoring objects, and obtain a one-to-one corresponding safety coefficient value of each monitori...
Embodiment 2
[0119] Embodiment two, such as Figure 4 As shown, a network security automatic configuration management method is applied to a network security automatic configuration management system in the present invention, including the following steps:
[0120] S1: Assign the initial trust value of each monitoring object in the monitoring area; where the monitoring objects include equipment, systems and software;
[0121] S2: Obtain a one-to-one corresponding security state value and security requirement value of each monitoring object in the monitoring area;
[0122] S3: Evaluate and analyze the safety factor of all monitored objects according to all initial trust degrees, all security state values and all security demand values of all monitored objects, and obtain the one-to-one corresponding safety factor value of each monitored object;
[0123] S4: Formulate a configuration strategy table according to all safety factor values of all monitored objects;
[0124] S5: According t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


