Risk assessment method and device
A risk assessment and risk technology, applied in the field of network security, can solve the problems of low accuracy of electronic equipment, not taking into account, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0087] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.
[0088] In order to facilitate the understanding of the solutions proposed in the embodiments of this application, the technical terms involved in this application are first introduced:
[0089] (1) System: It consists of multiple electronic devices, including a collection of electronic devices with specific connections. For example, a collection of electronic devices under the same intranet.
[0090] (2) Independent risk value: It is used to represent the degree of danger brought t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


