Method and device for evaluating network assets

A technology of network assets and parameters, applied in the field of network security, can solve the problem of not being able to assess the security risks of network assets, and achieve the effect of comprehensive assessment

Inactive Publication Date: 2020-12-15
POTEVIO INFORMATION TECH
View PDF12 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, in the assessment of vulnerability risk management, CVSS only conducts risk assessment and vulnerability quantitative management for a single vulnerability, and cannot comprehensively assess the security risk of network assets as a whole.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for evaluating network assets
  • Method and device for evaluating network assets
  • Method and device for evaluating network assets

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0035] figure 1 A flowchart of an embodiment of a method for assessing network assets in the present invention, such as figure 1 As shown, a method for evaluating network assets provided by an embodiment of the present invention includes the following steps:

[0036] S101: According to the classification of the vulnerabilities in the network ass...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method and a device for evaluating network assets, and the method comprises the steps: calculating a component vulnerability parameter, reflecting a networkasset component level, corresponding to each classification according to the classification of vulnerabilities in the network assets and the vulnerability parameter of each vulnerability; according toall the component vulnerability parameters corresponding to all the classifications, calculating overall vulnerability parameters reflecting the overall level of the network assets; determining the number of high-risk vulnerabilities and the total number of vulnerabilities according to all vulnerability parameters in the network assets; and determining a total evaluation value reflecting the overall vulnerability of the network assets according to the overall vulnerability parameters, the number of the high-risk vulnerabilities and the evaluation values corresponding to the total number of the vulnerabilities, and evaluating the overall vulnerability level of the network assets according to the total evaluation value. The device executes the method. According to the method and the deviceprovided by the embodiment of the invention, the vulnerability of the network assets can be accurately and comprehensively evaluated.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for evaluating network assets. Background technique [0002] With the rapid development of Internet technology, the information security of network assets has been promoted to a very important position. At present, vulnerability (vulnerability) is an important factor in network security, and the evaluation of vulnerability and its possible impact is involved in various security products (vulnerability scanning, intrusion detection, antivirus, patch management, etc.). However, there is currently no unified evaluation system standard in the industry. The Common Vulnerability Scoring System (CVSS) is developed by NIAC and maintained by FIRST. It is an open standard that can be adopted by product manufacturers for free. Using this standard , the vulnerability can be scored, and the degree of vulnerability can be determined by scoring. [0003] The numbe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/57
CPCH04L63/1433G06F21/577G06F2221/034
Inventor 孙宁宁
Owner POTEVIO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products