Unlock instant, AI-driven research and patent intelligence for your innovation.

Risk assessment method and device

A risk assessment and risk technology, applied in the field of network security, can solve the problems of low accuracy of electronic equipment, not taking into account, etc.

Pending Publication Date: 2021-09-17
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that when evaluating the security of electronic equipment, only the security loopholes of the electronic equipment itself are considered, and the influence of the external environment on the electronic equipment is not considered, resulting in a low accuracy of the security assessment of electronic equipment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk assessment method and device
  • Risk assessment method and device
  • Risk assessment method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0087] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0088] In order to facilitate the understanding of the solutions proposed in the embodiments of this application, the technical terms involved in this application are first introduced:

[0089] (1) System: It consists of multiple electronic devices, including a collection of electronic devices with specific connections. For example, a collection of electronic devices under the same intranet.

[0090] (2) Independent risk value: It is used to represent the degree of danger brought t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a risk assessment method and device, which are used for improving the accuracy of security assessment of electronic equipment. The method comprises the following steps: obtaining an independent risk value of each electronic device in a system where a to-be-evaluated electronic device is located; obtaining the risk value of the system according to the weighted average of the independent risk value of each electronic device in the system; and according to the risk value of the system and the independent risk value of the to-be-assessed electronic equipment, determining a risk value for performing risk assessment on the to-be-assessed electronic equipment.

Description

technical field [0001] The present application relates to the field of network security, in particular to a risk assessment method and device. Background technique [0002] With the popularization and development of computer technology, the related application of computer technology involves a wider range of people's work and life. However, this also makes people's various information more exposed to the Internet environment, so how to protect people's information security has become an urgent problem in the field of network security. [0003] At present, the method adopted for evaluating the security of electronic equipment is: obtain the security vulnerability of the electronic equipment, calculate the independent risk value of the electronic equipment according to the security vulnerability, and evaluate the security of the electronic equipment according to the independent risk value. It can be seen that when evaluating the security of electronic equipment, only the secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 岳岑杨少康杜宝丽吴昊樊志甲
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD