An extended knowledge map and construction method and system for information security risk assessment

A knowledge map and risk assessment technology, applied in the fields of artificial intelligence, database, and information security, can solve the problems of ignoring the map of the index system, inconvenient information security risks, and low query efficiency, and achieve the goal of improving query efficiency and maintainability Effect

Active Publication Date: 2021-06-04
北京金睛云华科技有限公司 +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In these schemes, after the above-mentioned evaluation targets are graphed and modeled, they are used as graph entities, combined with the relationships between these entities, to form an integrated knowledge graph, but these schemes ignore the graph of the index system, thus Inability to establish a complete, orderly, and sufficient association with the evaluation target, resulting in inconvenience of information security risks, low query efficiency, and poor maintenance performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An extended knowledge map and construction method and system for information security risk assessment
  • An extended knowledge map and construction method and system for information security risk assessment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0223] refer to figure 2 , if an enterprise X group is used as the evaluation target entity, the evaluation is carried out on a daily basis. A variety of quantitative characteristics were measured daily from January 1, and a comprehensive score was calculated. Assume that the most recent evaluation occurred on October 31st. Then, the institution itself is a T-type entity, and the index systems of each date constitute an M-type entity. T points to the M entity on January 1 with a firstM relationship, and points to the M entity on October 31 with a lastM relationship. At the same time, the M entity on October 31 points to the M entity on October 30 with a prevM relationship, and so on until it points to the M entity on January 1.

[0224] X Group has three companies under its jurisdiction, A, B, and C, which are also used as evaluation targets, corresponding to the corresponding T entities. These T entities and related relationships exist in the asset domain knowledge graph...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention belongs to the technical field of information security, artificial intelligence and database, and specifically relates to an extended knowledge map and construction method and system for information security risk assessment, including the following steps: constructing an entity, including at least the evaluation target entity T and the evaluation target entity T All evaluation index entities M within a specific time range; construct the relationship type between the evaluation target entity T and the evaluation index entity M; construct the calculation process of knowledge map data expansion, aging, prediction and aggregation; use the constructed entity, the constructed The relationship type and the calculation process of construction form an extended knowledge graph of information security risk assessment. In the present invention, the evaluation index data is also graph-based modeling, so that the evaluation index information is also included in the traditional information security knowledge map, and a sufficient association is established with the evaluation object, thereby bringing convenience to risk evaluation, improving query efficiency and maintainability sex.

Description

technical field [0001] The invention belongs to the technical fields of information security, artificial intelligence and databases, and specifically relates to an extended knowledge map for information security risk assessment and a construction method and system. Background technique [0002] Information security assessment refers to the process of quantifying and evaluating information security status and trends by using a specific index system and quantitative algorithm. It is also often called information security situational awareness. Information security assessments include institutional security risk assessments, security event severity assessments, and security threat hazard assessments. The evaluation index system is a combination of a series of specific index values. These index values ​​have a certain hierarchical relationship and are in the process of dynamic change. The index value is obtained after certain processing of quantitative features. Quantitative c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/36G06F16/28
CPCG06F16/288G06F16/367
Inventor 曲武
Owner 北京金睛云华科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products