Method, system and device for monitoring data security situation based on virtual cloud
A data security, virtual cloud technology, applied in the field of cloud computing
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] Aiming at the security issues of how to accurately assess risks and prevent data leakage when the virtual cloud drifts in the cloud space in the prior art, the embodiment of the present invention provides a method for monitoring the security situation based on virtual cloud data, by establishing an address information for the virtual cloud By monitoring the virtual cloud according to the address beacons, when the address beacons meeting the preset out-of-boundary conditions (for the convenience of expression, also called out-of-boundary beacons) are detected, these out-of-boundary beacons will be further judged and analyzed Whether there is a risk of data leakage, the security of the virtual cloud is improved. The flow process of the inventive method is as figure 1 As shown, the execution steps are as follows:
[0041] Step 101, establishing an address beacon of the virtual cloud by collecting the operation information of the virtual cloud to be monitored;
[0042] He...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


