Functional impairment network security threat identification device and information system
A network security and identification device technology, applied in the field of information security, can solve problems such as damage, unavailability, and lack of functions, and achieve the effects of reducing energy consumption, improving accuracy, and protecting the environment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0091] Example 1: If the data stored in the threat capability data subunit (that is, the threat capability) is the capability of the operator, it can be divided into five levels: the first level is for daily application users; the second level is for terminal The person with operation and configuration authority; the third level is the technician with software and application system configuration operation authority; the fourth level is the technician with equipment or software asset administrator authority; the fifth level is the access to the computer room for physical equipment and environmental control Technicians with direct access to equipment.
example 2
[0092] Example 2: If the data stored in the threat capability data subunit (that is, the threat capability) is subjective will and the ability to cause damage, it is divided into five levels: the first level is for causing minor losses; the second level is for personal Unintentionally causing ordinary losses; the third level is ordinary losses caused intentionally by individuals; the fourth level is causing more serious losses; the fifth level is causing serious losses.
example 3
[0093] Example 3: If the data stored in the threat capability data subunit (that is, the threat capability) is the capability of the threat initiator, it is divided into five levels: the first level is personal unintentional; the second level is personal intentional; The third level is for small organizations; the fourth level is for large, organized groups; the fifth level is for national-level, hostile organizations.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com