Security risk monitoring method and system, computer equipment and storage medium

A security risk and monitoring system technology, applied in the computer field, can solve problems such as a single risk monitoring item and cannot be solved in a closed loop, so as to achieve the effect of ensuring security protection capabilities and improving efficiency

Pending Publication Date: 2022-01-18
江苏云从曦和人工智能有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The present invention aims to solve the above-mentioned technical problems, and solve the problem that the risk monitoring item is single and cannot be solved in a closed loop

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security risk monitoring method and system, computer equipment and storage medium
  • Security risk monitoring method and system, computer equipment and storage medium
  • Security risk monitoring method and system, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the following will clearly and completely describe the technical solutions of the embodiments of the present invention in conjunction with the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present invention , but not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts fall within the protection scope of the present invention.

[0043] Before introducing the embodiments of the present invention, several concepts are clarified:

[0044] Internet Code Warehouse: A Code Hosting Platform for Open Source and Proprietary Software Projects

[0045] IDS: According to the configured security policy, monitor various attack behaviors to ensure the confidentiality, integrity and availability of networ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of computers, particularly provides a security risk monitoring method and system, computer equipment and a storage medium, and aims to solve the problem that a risk monitoring item is single and cannot be solved in a closed loop mode. In order to achieve the purpose, the method comprises the steps: performing data collection on various risk sources endangering data security; analyzing the collected data according to a risk identification rule, and identifying potential risks; and giving an alarm for the identified potential risk, and automatically connecting a problem processing system to create a work order, so that tracking and monitoring of the problem are realized. By applying the method, the problem that various existing safety monitoring tools are single in monitoring item is solved, various found risk events are subjected to closed-loop tracking management, the timeliness of event handling is improved, and the overall safety protection level is greatly improved.

Description

technical field [0001] The invention belongs to the technical field of computers, and specifically provides a safety risk monitoring method, system, computer equipment and storage medium. Background technique [0002] At present, the risks of code leakage, data leakage, and hacker attacks are common in Internet companies. Due to the lack of a complete security protection and system control system, employees have weak security awareness, and source code leakage incidents are hard to prevent, causing irreparable losses to the enterprise; various Internet threat intelligence and 0day vulnerabilities are increasing day by day, many of which are fatal to enterprise applications Risks; a large number of security devices will be deployed in the internal security construction of the enterprise, but there are not enough security engineers to effectively maintain these devices. Based on this status quo, major well-known security vendors have launched various security risk monitoring ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/57
CPCG06F21/563G06F21/577
Inventor 曾锋杨荣健王成瑶王炽明刘兰青
Owner 江苏云从曦和人工智能有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products