Information security supervision method and device
An information security and security technology, applied in computer security devices, program control devices, program control design, etc., can solve problems such as labor-consuming, repetitive work, and large amount of data, so as to improve work efficiency, reduce labor costs, and save manpower resource effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.
[0032] figure 1 It is a schematic diagram of an information security supervision method according to an embodiment of the present invention, as shown in figure 1 As shown, the embodiment of the present invention provides an information security supervision method, which realizes fully automatic operation of information security supervision without manual operation, and the method includes:
[0033] Step 101: input information security supervision requirements;
[0034] Step 102: Determine the information security supervision strategy according to the information sec...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


