Functional impairment network security threat identification device and information system

A network security and identification device technology, applied in the field of information security, can solve problems such as damage, unavailability, and lack of functions, and achieve the effects of reducing energy consumption, improving accuracy, and protecting the environment

Active Publication Date: 2021-07-27
国家信息中心
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the network world, there are various types of threats, among which the function damage network security threat is the most common one. The function damage network security threat refers to the unavailability or damage of some functions of business or system operation. However, currently In the prior art, there is a lack of an identification device that can comprehensively and accurately identify function-impairing network security threats, so as to accurately analyze and calculate the risks brought about by function-damaging network security threats, and also lacks an identification device that can target different levels of The risk of functional damage to network security threats, accurately adopt different levels of risk protection measures for information systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Functional impairment network security threat identification device and information system
  • Functional impairment network security threat identification device and information system
  • Functional impairment network security threat identification device and information system

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0091] Example 1: If the data stored in the threat capability data subunit (that is, the threat capability) is the capability of the operator, it can be divided into five levels: the first level is for daily application users; the second level is for terminal The person with operation and configuration authority; the third level is the technician with software and application system configuration operation authority; the fourth level is the technician with equipment or software asset administrator authority; the fifth level is the access to the computer room for physical equipment and environmental control Technicians with direct access to equipment.

example 2

[0092] Example 2: If the data stored in the threat capability data subunit (that is, the threat capability) is subjective will and the ability to cause damage, it is divided into five levels: the first level is for causing minor losses; the second level is for personal Unintentionally causing ordinary losses; the third level is ordinary losses caused intentionally by individuals; the fourth level is causing more serious losses; the fifth level is causing serious losses.

example 3

[0093] Example 3: If the data stored in the threat capability data subunit (that is, the threat capability) is the capability of the threat initiator, it is divided into five levels: the first level is personal unintentional; the second level is personal intentional; The third level is for small organizations; the fourth level is for large, organized groups; the fifth level is for national-level, hostile organizations.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a function-impaired network security threat identification device and an information system, the device comprising: a threat behavior judgment definition module, a threat initiator identification module, a threat action asset identification module, a threat path identification module, and a threat capability identification module , a threat occurrence frequency identification module and a threat occurrence timing identification module. The function-impaired network security threat identification device provided by the present invention can comprehensively and accurately identify the function-impaired network security threat, so as to accurately analyze and calculate the risks brought by the function-impaired network security threat; and the present invention provides The information system can accurately take different levels of risk protection measures for different levels of risk of function-damaging network security threats, which improves the security protection performance of the information system provided by the present invention.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a function-impaired network security threat identification device and an information system. Background technique [0002] In recent years, my country's cloud computing, big data, Internet of Things, industrial Internet, artificial intelligence and other new technologies and applications have developed on a large scale, and network security risks have converged and superimposed and evolved rapidly. The application of Internet technology continues to blur the boundary between the physical world and the virtual world, and its integration, penetration, and driving role in the development of the entire economy and society are becoming more and more obvious. The risks and challenges it brings are also increasing, and cyberspace threats and risks are increasing. [0003] Information security risk assessment is the process of evaluating the security attributes such as confi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 禄凯陈永刚任金强赵增振刘丰刘龙涛
Owner 国家信息中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products