Security risk event processing method, apparatus and device, and storage medium

A security risk and event processing technology, applied in the field of security management, can solve problems such as poor operation portability, low overall efficiency, and security risk loopholes in sending scripts

Active Publication Date: 2020-03-13
SANGFOR TECH INC
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. Remotely log in to the device to perform disposal operations. The disadvantage of this technology is that the operation is not portable and cannot be processed quickly through the platform.
[0004] 2. Send the script to the device through the unified platform, and the device executes the script and then returns the result to the platform. The disadvantage of this technology is that it takes a certain amount of time to send the script and execute the script, and the overall efficiency is relatively low. At the same time, there are Potentially Exploitable Security Risk Vulnerabilities
[0005] Therefore, there is essentially a technical problem of how to conveniently handle security risk events and improve processing efficiency and safety

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security risk event processing method, apparatus and device, and storage medium
  • Security risk event processing method, apparatus and device, and storage medium
  • Security risk event processing method, apparatus and device, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0067] refer to figure 1 , figure 1 It is a schematic structural diagram of a security risk event processing device in the hardware operating environment involved in the solution of the embodiment of the present invention.

[0068] Such as figure 1 As shown, the security risk event processing device may include: a processor 1001 , such as a central processing unit (Central Processing Unit, CPU), a communication bus 1002 , a user interface 1003 , a network interface 1004 , and a memory 1005 . Wherein, the communication bus 1002 is used to realize connection and communication between these components. The user interface 1003 may include a display screen (Display) and an input unit such as a button, and the optional user interface 1003 may also include a standard wired interface and a wireless interface. Optionally, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of safety management and discloses a security risk event processing method, apparatus and device, and a storage medium. The method comprises the followingsteps of: receiving a security log and basic device information reported by each piece of security device, determining a target security risk event and a target security device, if the target safety device has the linkage function, executing the next step; if so, determining an attack object according to the target security risk event and the target security device; acquiring type characteristicsof the attack object; determining a danger level according to the type characteristics; generating an event processing strategy to perform security risk event processing on the target security device.Therefore, the target security risk event is screened out from the security log reported by each security device. The target safety device is determined according to the target safety risk event, andthe event processing strategy is generated to process the safety risk event, so that the technical problems of how to process the safety risk event conveniently and how to improve the processing efficiency and safety are solved.

Description

technical field [0001] The present invention relates to the technical field of security management, in particular to a security risk event processing method, device, equipment and storage medium. Background technique [0002] At present, security risk event handling technologies mainly include the following two types: [0003] 1. Remotely log in to the device to perform disposal operations. The disadvantage of this technology is that the operation is not portable and cannot be processed quickly through the platform. [0004] 2. Send the script to the device through the unified platform, and the device executes the script and then returns the result to the platform. The disadvantage of this technology is that it takes a certain amount of time to send the script and execute the script, and the overall efficiency is relatively low. At the same time, there are A security risk vulnerability that could be exploited. [0005] Therefore, essentially there is a technical problem of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/24
CPCH04L63/1416H04L63/1425H04L63/20H04L63/0876H04L67/141H04L41/14
Inventor 吴博
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products