Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information system security risk assessment method and device, equipment, and storage medium

An information system and security risk technology, applied in the field of devices, equipment and storage media, and information system security risk assessment methods, can solve the problems of low accuracy and achieve accurate security risk assessment results

Pending Publication Date: 2021-03-16
国家工业信息安全发展研究中心
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The information system security risk assessment method in the traditional technology has the problem of low accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information system security risk assessment method and device, equipment, and storage medium
  • Information system security risk assessment method and device, equipment, and storage medium
  • Information system security risk assessment method and device, equipment, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0046] It can be understood that the terms "first", "second", "third", "fourth", etc. (if any) in the embodiments of the present application are used to distinguish similar objects, and not necessarily used to describe a specific order or sequentially.

[0047] It can be understood that the term "and / or" used in this application refers to any combination and all possible combinations of one or more of the associated listed items, and includes these combinations.

[0048] The information system security assessment method provided in the embodiment of the present applicatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is applicable to the technical field of computers, and provides an information system security risk assessment method and device, equipment and a storage medium. The information system security risk assessment method comprises the steps of obtaining an asset standing book of an information system, the asset standing book comprising multiple assets; obtaining an asset value, threat information, first vulnerability information and existing security measures of the asset; obtaining a vulnerability detection result of the information system, and determining a target asset with a security vulnerability in the plurality of assets according to the vulnerability detection result; and determining a security event existing in the target asset and a risk value corresponding to the security event according to the vulnerability information of the target asset, the asset value, the threat information, the first vulnerability information and the existing security measures. The method provided by the invention is high in safety risk assessment accuracy.

Description

technical field [0001] The present application belongs to the field of computer technology, and in particular relates to an information system security risk assessment method, device, equipment and storage medium. Background technique [0002] With the rapid development of industrialization and informationization, enterprise information system came into being. However, while information systems bring benefits and convenience to enterprises, they also bring a series of security problems. Once there are flaws and loopholes in the information system and are successfully exploited by attackers, it will cause data leakage at the least, and it will have a huge impact on the enterprise and even society at the worst. Therefore, it is very necessary to ensure the security of the information system. [0003] One of the important means to ensure the security of information system is to conduct security risk assessment. The security risk assessment for enterprise information system c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06F21/57
CPCG06Q10/0635G06F21/577
Inventor 张格孙军张永静龚亮华
Owner 国家工业信息安全发展研究中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products