Method for calculating vulnerability risks

A vulnerability and risk technology, applied in the field of computing vulnerability risk, can solve problems such as lack of professionalism and experience of assessors, non-standard and inconsistent risk assessment standards, and incomplete assessment results, so as to improve development specifications and requirements and improve development quality , the effect of avoiding economic loss and reputation risk

Pending Publication Date: 2020-10-09
李佳兴
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, under normal circumstances, vulnerability risk assessments are often not comprehensive and in-depth, and the rectification measures are not thorough or targeted due to non-standardized and inconsistent risk assessment standards and insufficient professionalism and experience of assessors.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for calculating vulnerability risks
  • Method for calculating vulnerability risks
  • Method for calculating vulnerability risks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0067] Please refer to the accompanying drawings of the specification. A method for calculating vulnerability risk in an embodiment of the present invention includes the following methods:

[0068] S1. Standardize the vulnerability level;

[0069] S2, the hazard level of vulnerabilities combined with the seven-ho analysis method to standardize the evaluation dimensions;

[0070] S3. Standardization of the baseline;

[0071] S4. Perform a matching analysis on the risk values ​​between the standardization in S1, S2, and S3 and the enterprise systems, and draw a conclusion.

[0072] Further, the vulnerability levels in the S1 step are classified into extremely high-risk vulnerabilities, high-risk vulnerabilities, medium-risk vulnerabilities, medium-low-risk vulnerabilities, and low-risk vulnerabilities according to the vulnerability grade scoring standard.

[0073] Highly harmful leakage: mainly refers to the loopholes that directly cause damage to the target system of the enterprise, bring...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for calculating vulnerability risks, which comprises the following steps of S1, standardizing vulnerability levels; S2, standardizing the evaluation dimension by combining the hazard level of the vulnerability with a 5W2H method; S3, standardizing the datum line; S4, performing matching analysis on the standardization in S1, S2 and S3 and risk values between systems of the enterprise to obtain a conclusion. According to the method, risk quantification is carried out on each vulnerability in combination with the vulnerability hazard level and the 5W2H method, sothat a more accurate and objective evaluation result is obtained, the risk level of the vulnerability existing in the current system is known more visually, a more feasible rectification scheme is formulated, and a more effective rectification effect is achieved. And each quantification result is recorded in a case, statistics is carried out on various risk occurrence frequencies of each system regularly, weakness of each system during development is understood, development specifications and requirements are perfected in a more targeted manner, and development quality is improved.

Description

Technical field [0001] The invention relates to the field of computer security, in particular to a method for calculating the risk of a vulnerability. Background technique [0002] With the popularization of the Internet, the application of computers has become more and more extensive, and the security of computer systems has gradually become a matter of great concern to people. Due to flaws in the logic design of application software or operating system software, or errors in writing programs, the computer system has system vulnerabilities, causing this flaw or error to be exploited by criminals or computer hackers by planting Trojan horses or viruses Attack or control the entire computer by other means, thereby stealing important data and information in the computer, or even destroying the computer system. [0003] There are many existing vulnerability repair products, all of which can provide the function of repairing vulnerabilities. Users need to regularly start software pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 李佳兴钱嘉晶
Owner 李佳兴
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products