Unlock instant, AI-driven research and patent intelligence for your innovation.

Information security risk processing method and device

A technology of information security and risk, applied in the field of information security

Active Publication Date: 2020-02-04
HUA XIA BANK
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides a method and device for processing information security risks, which are used to solve the problem of processing information security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security risk processing method and device
  • Information security risk processing method and device
  • Information security risk processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0087] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0088] The specific implementation of information security risk processing in the embodiment of the present invention will be described in detail below with reference to the accompanying drawings.

[0089] see figure 1 , shows a schematic flowchart of a method for processing information security risks in an embodiment of the present invention. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information security risk processing method and device. The method comprises the steps of searching a key asset value, a threat value and a vulnerability value; obtaining arisk value of each level in the information system according to the key asset value, the threat value and the vulnerability value, wherein layers of the information system comprise a physical layer, anetwork layer, a host layer, an application layer and a data layer; summing the maximum value in the risk values of the layers and the logarithm value of the sum of the risk values of the remaining layers except the maximum value to obtain the total risk value of the information system; and processing the information security risk of the information system by adopting a shorter processing time limit along with the rise of the threshold interval where the total risk value is located. The influence degree of the information security risk on the information system can be known according to the total risk value of the information system, and a decision is effectively made to guarantee information security.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a method and device for processing information security risks. Background technique [0002] With the development of information technology, my country's financial institutions, enterprises and institutions, commercial organizations and other industries have begun to widely use information technology to enhance their competitiveness. With the help of information technology, resources can be managed more effectively and operational efficiency can be improved. The processing of information relies more and more on computers, but computers have their inherent weaknesses, such as virus threats, hacking, and illegal operations by operators, which will lead to risks in information security. The economic losses suffered by all walks of life in my country due to information security issues are incalculable every year, and information security issues are becoming increasingly pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06Q10/06H04L29/06
CPCG06F21/577G06Q10/0635H04L63/1433
Inventor 吴永飞寿弘宇金建新杨青常宗
Owner HUA XIA BANK