Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network asset management method and device, equipment and medium

A technology of network assets and management methods, applied in resources, data processing applications, instruments, etc., can solve problems such as unfavorable key information infrastructure protection, achieve comprehensive and accurate risk classification, and facilitate risk management

Pending Publication Date: 2021-09-17
EVERSEC BEIJING TECH
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Key information infrastructure is a type of network assets. The current network asset risk classification system is mainly reflected in three aspects: confidentiality, integrity and availability of assets, and only the confidentiality and integrity of key information infrastructure Classification of risk level and availability is not conducive to the protection of critical information infrastructure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network asset management method and device, equipment and medium
  • Network asset management method and device, equipment and medium
  • Network asset management method and device, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] figure 1 It is a flow chart of a network asset management method provided by Embodiment 1 of the present disclosure, and the method can be executed by a network security event monitoring and analysis system. Among them, the threat attack signature database, network threat information database, network asset information database and threat intelligence database are deployed in the network security event monitoring and analysis system.

[0030] Wherein, the deployed threat attack feature library is used to manage feature information of various network threat attacks and provide various types of network threat attack features. The threat attack feature library contains various types of network threat attack feature information and network attack event monitoring rules. The network attack event monitoring rules are used to detect network attack events in network traffic. The types of monitoring rules include but are not limited to advanced persistent threats ( Advanced Per...

Embodiment 2

[0070] figure 2 A structural diagram of a network asset management device provided in Embodiment 2 of the present disclosure. The device can execute the network asset management method in Embodiment 1 above, and can be configured in a network security event monitoring and analysis system, such as figure 2 As shown, the apparatus includes an object module 210, an evaluation module 220 and a management module 230, wherein:

[0071] The target module 210 is configured to determine target network asset information in the management network assets according to threat events in network traffic in a predetermined network area, where the predetermined network area includes two or more management network assets.

[0072] The assessment module 220 is configured to determine a risk assessment value of the target network asset according to the first assessment indicator of the target network asset, the second assessment indicator of the threat event, and the third assessment indicator o...

Embodiment 3

[0083] Refer below image 3 , which shows a structural diagram of an electronic device 900 suitable for implementing the embodiments of the present disclosure. The electronic device in the embodiments of the present disclosure has a network asset management function. image 3 The illustrated electronic device is only an example, and should not impose any limitation on the functions and scope of use of the embodiments of the present disclosure.

[0084] Such as image 3 As shown, the electronic device 900 may include a processing device (such as a central processing unit, a graphics processing unit, etc.) 901, which may be loaded into a random access memory (RAM) according to a program stored in a read-only memory (ROM) 902 or loaded from a storage device 908. ) 903 to perform various appropriate actions and processing. In the RAM 903, various programs and data necessary for the operation of the electronic device 900 are also stored. The processing device 901 , ROM 902 , an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a network asset management method and device, equipment and a medium, and the method comprises the steps: determining target network asset information in management network assets according to a threat event in the network flow of a predetermined network region, wherein the predetermined network region comprises two or more than two management network assets; determining a risk assessment value of the target network asset according to the first assessment index of the target network asset, the second assessment index of the threat event and the third assessment index of threat intelligence; and performing risk management of the target network assets according to the risk assessment value. By adopting the technical scheme of the embodiment of the invention, the risk division of the network assets is more comprehensive and accurate, and the risk management of the network assets is facilitated.

Description

technical field [0001] Embodiments of the present disclosure relate to data processing technologies, and in particular, to a network asset management method, device, device, and medium. Background technique [0002] Key information infrastructure refers to network information services provided to the public or information systems or industrial control systems that support the operation of important industries such as energy, communications, finance, transportation, and public utilities. Key information infrastructure is a type of network assets. The current network asset risk classification system is mainly reflected in three aspects: confidentiality, integrity and availability of assets, and only the confidentiality and integrity of key information infrastructure Classification of risk levels and availability is not conducive to the protection of critical information infrastructure. Contents of the invention [0003] Embodiments of the present disclosure provide a networ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06
CPCG06Q10/0635G06Q10/0637G06Q10/06393
Inventor 冯福伟孟艳青李鹏超尚程王杰杨满智蔡琳梁彧田野金红陈晓光傅强
Owner EVERSEC BEIJING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products