Vulnerability management system integrating vulnerability scanning engine and vulnerability work order management

A vulnerability scanning and vulnerability management technology, which is applied in the field of data processing and can solve problems such as identification and security specifications do not meet

Pending Publication Date: 2021-11-26
北京凌云信安科技有限公司
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although there are configuration checklists, industry norms, and programmatic requirements for graded protection that provide operation and maintenance personnel with a basis for checking security configurations, how to quickly and effectively check the various types and qua

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability management system integrating vulnerability scanning engine and vulnerability work order management
  • Vulnerability management system integrating vulnerability scanning engine and vulnerability work order management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the purposes, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative work fall within the protection scope of this application.

[0049]Considering that security configuration errors are generally caused by personnel operating errors. Although there are configuration checklists, industry norms, and programmatic requirements for graded protection that provide operation and maintenance personnel with a basis for checking security configurations, how to quickly and effect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a vulnerability management system integrating a vulnerability scanning engine and vulnerability work order management, and the system comprises a vulnerability work order management module which is used for carrying out the work order issuing and management of five different vulnerability management stages: vulnerability discovery, vulnerability verification, vulnerability disposal, vulnerability reinforcement, and vulnerability retest; a source code security audit module which is used for performing comprehensive static analysis on the software source code, performing semantic analysis in combination with an AST abstract syntax tree, performing multi-level semantic analysis and function backtracking, and detecting to obtain security vulnerabilities existing in the software source code; an offline weak password scanning module which is used for acquiring a password file through an SSH protocol and uploading the password file in a manual mode, and discovering a weak password through Hash matching. According to the system, various vulnerability problems, including various security holes, security configuration problems and non-compliance behaviors, existing in the information system can be comprehensively and accurately detected.

Description

technical field [0001] The present application relates to the field of data processing, in particular to a vulnerability management system integrating a vulnerability scanning engine and vulnerability work order management. Background technique [0002] Whether the information system configuration operation is safe is also an important aspect of security risks. Security configuration errors are generally caused by human error. Although there are now configuration checklists, industry specifications and programmatic specifications for graded protection that allow operation and maintenance personnel to check the security configuration, how to quickly and effectively check in the face of a wide variety of devices and software in the network Security configuration, identifying items that do not conform to security specifications, in order to meet the requirements of rectification and compliance, this is also a difficult problem for operation and maintenance personnel. [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57H04L29/06
CPCG06F21/577H04L63/1433
Inventor 余精彩董丽萍
Owner 北京凌云信安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products