Method and device for obtaining configuration check list, electronic equipment and storage medium
A checklist and fuzzy matching technology, which is applied in the field of network security, can solve the problems of low security, high labor cost, and not necessarily standardized manual customized configuration list, so as to reduce uncertain factors, reduce labor costs, and avoid losses.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] In order to illustrate the embodiments of the present invention more clearly, the technical terms involved are explained and illustrated:
[0024] CPE: CPE is (abbreviation of Common Platform Enumeration) a method for naming software applications, operating systems, and hardware in a standardized manner.
[0025] NCP: NCP is the abbreviation of National Checklist Program. It is a security checklist (or benchmark) library published by the US government defined by NIST SP 800-70, which provides detailed guidance for the security configuration of operating systems and applications.
[0026] xml: Extensible Markup Language, a subset of the Standard General Markup Language, referred to as xml. Is a markup language used to mark up electronic documents to make them structured. In electronic computers, tags refer to information symbols that computers can understand. Through such tags, computers can process various information such as articles. It can be used to mark data, def...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


