Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Statistical Method for Priority of Vulnerability Disposal and Repair

A statistical method and prioritization technology, applied in computing, electrical digital data processing, computer security devices, etc., can solve the problems of prioritization score restoration, prioritization, normalization and classification, etc. The effect of improving efficiency

Active Publication Date: 2022-07-26
STATE GRID ZHEJIANG ELECTRIC POWER CO LTD QUZHOU POWER SUPPLY CO
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0019] The present invention solves the problem that the quantification of the prior art priority score and the normalized level assignment of the repair priority cannot be taken into account at the same time, and proposes a statistical method for vulnerability disposal and repair priority, which combines multiple dimensions Parameters to achieve the transition from qualitative to quantitative

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Statistical Method for Priority of Vulnerability Disposal and Repair
  • A Statistical Method for Priority of Vulnerability Disposal and Repair
  • A Statistical Method for Priority of Vulnerability Disposal and Repair

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0050] This embodiment proposes a statistical method for the priority of vulnerability disposal and repair, refer to figure 1 , including the following steps:

[0051] S1, obtain asset value L and vulnerability vulnerability value V;

[0052] The acquisition process of asset value L is as follows:

[0053] Establish an asset value grading table. The asset value grading table includes the grade, the corresponding logo of the grade, and the corresponding description of the standard corresponding to the logo. The grade values ​​are 1, 2, 3, 4, and 5; the enterprise user divides the table according to the asset value grade as: Asset value assignment, the enterprise user selects the value of the grade as the asset value L.

[0054]According to the national standard GB / T 20984-2007, when an enterprise assigns value to an asset, it can obtain the asset value through a comprehensive assessment based on the confidentiality, integrity and availability of the asset. The final assignme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a method for statistics of vulnerability disposal and repair priority, which includes the following steps: S1, obtaining asset value L and vulnerability vulnerability value V; S2, using the following formula to substitute asset value L and vulnerability vulnerability value V into calculation to calculate Vulnerability risk value S, S=F(f(L), g(V)); where: f(L) is the asset value calculation function, g(V) is the vulnerability vulnerability value calculation function, F(f(L) , g(V)) is the relation function. The invention combines parameters of multiple dimensions to realize the transformation from qualitative to quantitative.

Description

technical field [0001] The invention relates to the technical field of vulnerability disposal, in particular to a statistical method of vulnerability disposal and repair priority. Background technique [0002] As users pay more and more attention to network security, the demand for asset management and monitoring is also increasing. As an indicator of asset security, asset vulnerability has also received increasing attention. Among them, vulnerabilities are one of the main factors for asset vulnerability measurement, and repairing vulnerabilities has become an extremely critical part of security protection construction. [0003] In terms of vulnerability management, for some users with limited security operation and maintenance capabilities, if a large number of vulnerabilities are found after the system goes online, it will be difficult and inefficient for users to manage a large number of vulnerabilities. In general systems or standards, vulnerabilities are defined accor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/034
Inventor 郑翔徐红泉杜奇伟周慧忠毛以军王海园方超侯雅林汪红利周利庆张锋明卢巍田晨
Owner STATE GRID ZHEJIANG ELECTRIC POWER CO LTD QUZHOU POWER SUPPLY CO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products