Information system security risk assessment method and device, equipment, and storage medium
An information system and security risk technology, applied in the field of devices, equipment and storage media, and information system security risk assessment methods, can solve the problems of low accuracy and achieve accurate security risk assessment results
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.
[0046] It can be understood that the terms "first", "second", "third", "fourth", etc. (if any) in the embodiments of the present application are used to distinguish similar objects, and not necessarily used to describe a specific order or sequentially.
[0047] It can be understood that the term "and / or" used in this application refers to any combination and all possible combinations of one or more of the associated listed items, and includes these combinations.
[0048] The information system security assessment method provided in the embodiment of the present applicatio...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com