Private network security risk processing method and device, equipment and storage medium

A security risk and processing method technology, applied in the field of private network security risk processing methods, devices, equipment, and storage media, can solve problems such as inability to process security risk situations and risk equipment

Active Publication Date: 2021-12-07
GUANGZHOU TRUSTMO INFORMATION SYST CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a private network security risk processing method, device, equipment, and storage medium, which solves the problem that the existing technology cannot handle the risk equipment in the private network according to the security risk of the private network as a whole. Situation to deal with technical issues of risky equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private network security risk processing method and device, equipment and storage medium
  • Private network security risk processing method and device, equipment and storage medium
  • Private network security risk processing method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] Such as figure 1 as shown, figure 1 It is a flowchart of a private network security risk processing method provided by an embodiment of the present invention. The private network security risk processing method provided by the embodiment of the present invention can be executed by a private network security risk processing device, which can be implemented by software and / or hardware, and the private network security risk processing device can be two One or more physical entities can also be composed of one physical entity. For example, private network security risk processing equipment can be computers, host computers, servers, tablets and other equipment. The method includes the following steps:

[0057] Step 101. Obtain the device information of each device in the private network, and construct an electronic map of the device according to the device information.

[0058] In this embodiment, it is first necessary to obtain the device information of each device in t...

Embodiment 2

[0069] figure 2 A flow chart of another private network security risk processing method provided by the embodiment of the present invention, as shown in figure 2 shown, including the following steps:

[0070] Step 201 , formulating a list of risk treatment measures, which includes safety risk levels and risk treatment measures corresponding to the safety risk levels.

[0071] In this embodiment, it is first necessary to formulate a list of risk treatment measures. In the process of formulating the list of risk treatment measures, it is necessary to determine the security risk level of the private network, and formulate corresponding risk treatment measures for each security risk level.

[0072] In one embodiment, the security risk level includes a first security risk level, a second security risk level and a third security risk level.

[0073] In this embodiment, in the process of formulating the list of risk treatment measures, three security risk levels are set, which ar...

Embodiment 3

[0094] Such as Figure 4 as shown, Figure 4 A schematic structural diagram of a private network security risk processing device provided in an embodiment of the present invention, including:

[0095] The electronic map construction module 301 is used to obtain the device information of each device in the private network, and construct the device electronic map according to the device information.

[0096] The data receiving module 302 is configured to receive border risk data sent by network peripheral sensors. The network peripheral sensors are deployed in the sub-network of the private network, and are used to detect border risk data of devices in the sub-network.

[0097] The data analysis module 303 is used to analyze the boundary risk data, determine the security risk level of the private network and determine the risky equipment in the private network.

[0098] The display module 304 is configured to mark risky devices in the electronic device map, and display the mar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a private network security risk processing method and device, equipment and a storage medium, wherein the method comprises the steps of obtaining the equipment information of each piece of equipment in a private network, and constructing an equipment electronic map according to the equipment information; receiving boundary risk data sent by a network tip sensor, and deploying the network tip sensor in a subnet network of a private network and using the network tip sensor for detecting the boundary risk data of equipment in the subnet network; analyzing the boundary risk data, determining the security risk level of the private network and determining risk equipment in the private network; marking the risk equipment in the equipment electronic map, and displaying the marked equipment electronic map and the safety risk level; and determining a corresponding risk processing measure according to the security risk level, and processing the risk equipment according to the risk processing measure. The technical problem that the risk equipment cannot be processed according to the overall security risk condition of the private network in the process of processing the risk equipment in the private network in the prior art is solved.

Description

technical field [0001] The embodiments of the present application relate to the field of private network security, and in particular to a private network security risk processing method, device, equipment, and storage medium. Background technique [0002] A private network is usually a communication network built to meet the needs of some specific industries. When the equipment in the private network is connected to the Internet, there is a risk that the equipment will be controlled by the Internet server or implanted with a virus, which seriously threatens the information security of the private network. At present, the security of the private network is generally detected by detecting network attacks, but this method cannot obtain the overall security situation of the private network, and cannot handle the risky equipment according to the overall security risk situation of the private network, and During the processing, the user cannot quickly know the specific location o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/1416H04L63/1441H04L41/12H04L41/22
Inventor 邹凯
Owner GUANGZHOU TRUSTMO INFORMATION SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products