Information service security evaluation method and device

A security assessment and information service technology, applied in the field of information service security assessment, can solve the problems of inconvenient use, high cost, slow detection speed, etc., to achieve the effect of improving efficiency, improving performance and efficiency, and avoiding re-development

Pending Publication Date: 2020-08-07
CHINA ACADEMY OF INFORMATION & COMM
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Although this method can complete the security evaluation work for information service systems, because the information service systems can be quickly installed and deployed on the cloud computing platform, the number of information service systems will be very large, and in order to detect new types of viruses and network attacks , the number of security evaluation programs is very large and will increase at any time, resulting in the disadvantages of this traditional evaluation method and system, such as inconvenient use, slow detection speed, and high cost for large-scale simultaneous detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information service security evaluation method and device
  • Information service security evaluation method and device
  • Information service security evaluation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some, not all, embodiments of the application. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.

[0030] The terms "first", "second", "third", "fourth", etc. (if present) in the description and claims of the present invention and the above-mentioned drawings are used to distinguish similar objects and are not necessarily used to describe a specific order or sequence. It is to be understood that the data so used may be interchanged under appropriate circumstances such that the embodiments of the invention described herein can be practiced in sequences other than those illustrated or ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an information service security evaluation method and device, and the method comprises the steps: combining a security evaluation program with the configuration information of an information service system needing to be evaluated, and forming a plurality of security evaluation examples; assigning a priority to each security evaluation instance; adding the security evaluationinstance into a message queue as a message object; sorting the security evaluation instances in the message queue according to priorities from high to low; and taking out the security evaluation instance from the message queue for execution and obtaining a security evaluation result. According to the method, information service security evaluation can be realized on the premise of easiness in use, high efficiency and low cost.

Description

technical field [0001] The invention relates to the field of computer application technology, in particular to an information service security evaluation method and device. Background technique [0002] With the rapid development of cloud computing technology, more and more information service systems are deployed on cloud computing platforms. Because cloud computing platforms are based on virtualization technology, resources such as computing, storage, and networks can be dynamically allocated and recycled, and information service systems are also It can be installed, deployed, operated and destroyed quickly, so it is also facing new challenges to ensure the security of the information service system on the cloud computing platform. [0003] In recent years, the security situation faced by the information service system on the cloud computing platform has become increasingly severe. New types of viruses and network attacks emerge in an endless stream, which may pose a threa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/034
Inventor 陈凯栗蔚马飞洪坤贤李哲苏越韩金鹏
Owner CHINA ACADEMY OF INFORMATION & COMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products