Risk assessment method, device and equipment and storage medium

A technology of risk assessment and equipment, applied in the field of network security, can solve the problem that the zero trust model does not give dynamic judgment, and achieve the effect of risk assessment

Pending Publication Date: 2021-12-31
上海派拉软件股份有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the zero trust model of the existing technology does not give a dynamic judgment on how to make risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk assessment method, device and equipment and storage medium
  • Risk assessment method, device and equipment and storage medium
  • Risk assessment method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] figure 1 It is a flow chart of a risk assessment method provided by Embodiment 1 of the present invention. This embodiment of the present invention is applicable to the situation where the risk level of the currently accessed data needs to be determined. The method can be executed by a computer device, and specifically includes the following steps:

[0046] Step 110, after receiving a preset amount of historical access data, determine the data type of the current access data, where the data type includes categorical data and numerical data.

[0047] In the existing technology, the risk level of the access data can be determined based on the topological relationship, but the existing technology cannot determine the risk level of all the access data, which may easily cause the omission of the access data, so a zero-trust model is proposed to dynamically determine the risk level The method replaces the risk level determination method in the prior art, and realizes the dete...

Embodiment 2

[0066] figure 2 It is a flow chart of a risk assessment method provided by Embodiment 2 of the present invention, which is embodied on the basis of the above-mentioned embodiments. In an embodiment of the present invention, the method may also include:

[0067] Step 210, after receiving a preset amount of historical access data, determine the data type of the current access data, where the data type includes categorical data and numerical data.

[0068] After the zero trust model receives a preset amount of historical access data, the method and specific steps of determining the data type of the current access data have been described in detail in Embodiment 1, and will not be repeated here.

[0069] Step 220. Determine the value of the currently accessed data according to the data type of the currently accessed data.

[0070] The method and specific steps for determining the value of the currently accessed data have been described in detail in Embodiment 1, and will not be...

Embodiment 3

[0113] Figure 4 The structure diagram of a risk assessment device provided by Embodiment 3 of the present invention is suitable for realizing risk assessment of currently accessed data when the risk level of currently accessed data needs to be determined. The device can be realized by software and / or hardware, and is generally integrated in computer equipment.

[0114] Such as Figure 4 As shown, the device includes:

[0115] The first determination module 410 is configured to determine the data type of the current access data after receiving a preset amount of historical access data, and the data type includes categorical data and numerical data.

[0116] The second determining module 420 is configured to determine the value of the currently accessed data according to the data type of the currently accessed data.

[0117] The third determination module 430 is configured to determine the risk level of the currently accessed data according to the value of the currently acce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a risk assessment method, device and equipment and a storage medium, and the method comprises the steps: determining the data type of current access data after a preset number of historical access data is received, wherein the data type comprises classified data and numeric data; determining the numerical value of the current access data according to the data type of the current access data; determining the risk level of the current access data according to the numerical value of the current access data, a warning numerical value range and an alarm numerical value range, wherein the alarm numerical value range comprises the warning numerical value range. According to the technical scheme, the risk level of the current access data is determined through the numerical value of the current access data, and risk assessment of the current access data is achieved.

Description

technical field [0001] Embodiments of the present invention relate to network security technologies, and in particular to a risk assessment method, device, equipment and storage medium. Background technique [0002] The zero trust model is an Internet technology security model. The zero trust model requires strict authentication of all people and devices outside or inside the network when accessing private network resources. In the zero trust model, a dynamic risk judgment method can be used for access risk assessment. [0003] In the existing technology, the zero trust model can use the dynamic judgment of risk to replace the risk judgment based on topology relationship in traditional security. [0004] However, the zero trust model in the prior art does not give a dynamic judgment on how to make risks. Contents of the invention [0005] The present invention provides a risk assessment method, device, equipment and storage medium, so as to realize the risk assessment o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06F16/28G06F16/2458
CPCG06Q10/0635G06F16/285G06F16/2462
Inventor 张毅骏谭翔
Owner 上海派拉软件股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products