Unlock instant, AI-driven research and patent intelligence for your innovation.

System detection method and device, electronic equipment and storage medium

A detection method and equipment technology, applied in the field of network security, can solve the problems of slow speed, flaws in the inspection process, low efficiency, etc., to avoid flaws, reduce labor costs, and improve work efficiency.

Pending Publication Date: 2022-02-25
GUANGDONG POWER GRID CO LTD +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, when performing network security checks on multiple hosts, it is usually necessary for the staff to carry the checklist to personally operate the corresponding equipment, and check the items related to the hosts one by one according to the content in the checklist, which is not only slow and inefficient, but also possibly Due to many human factors, there are mistakes in the inspection process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System detection method and device, electronic equipment and storage medium
  • System detection method and device, electronic equipment and storage medium
  • System detection method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] figure 1 It is a schematic flow chart of a system detection method provided by Embodiment 1 of the present invention. This embodiment is applicable to the situation where network security detection is performed on hosts in the system in an automated manner, and the method can be executed by a system detection device , the apparatus may be implemented in the form of software and / or hardware, and the hardware may be electronic equipment, such as a mobile terminal, a PC terminal, or a server.

[0028] Such as figure 1 As shown, the method specifically includes the following steps:

[0029] S110. Determine the item to be detected in response to the network security detection instruction.

[0030] Wherein, the network security detection instruction is an instruction to trigger the network security detection of the host to be detected. Specifically, in this embodiment, in order to perform network security detection on the host to be detected associated with the system, it ...

Embodiment 2

[0042] figure 2 It is a schematic flow diagram of a system detection method provided by Embodiment 2 of the present invention. On the basis of the foregoing embodiments, in response to a network security detection instruction, a network security detection item table is obtained, and based on the item table, the host computer to be detected is determined. Each sub-item in the system’s to-be-tested items; when the to-be-tested sub-items are different, it is tested in a differentiated form to obtain the corresponding sub-test results; the basic information of the host system to be tested and each sub-test The results are jointly filled into the network security detection item table, and the table is fed back to the target terminal device, realizing the technical effect of automatically feeding back the target detection results to the staff in a concise and clear form. For its specific implementation, refer to the technical solution of this embodiment. Wherein, technical terms t...

Embodiment 3

[0068] As an optional embodiment of the above embodiment, image 3 It is a schematic flowchart of a system detection method provided by Embodiment 3 of the present invention. In order to clearly introduce the technical solution of this embodiment, the application scenario can be introduced as an example where the network security detection is performed on the host in the Linux system in an automated form, but it is not limited to the above scenarios and can be applied to various In a scenario where network security detection of the system is required.

[0069] see image 3 , when performing network security testing on the host system to be tested, it is first necessary to obtain the source file of the standard form of the network security ledger based on the program in the application software, that is, the network security testing item table in Embodiment 1 and Embodiment 2. In the actual application process, this form is mainly used to check whether the network security ha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a system detection method and device, electronic equipment and a storage medium. The method comprises the following steps: determining a to-be-detected item in response to a network security detection instruction, wherein the to-be-detected item comprises at least one of a user management sub-item, a password configuration sub-item, a login timeout sub-item, a port sub-item, a service switch state sub-item, a remote access sub-item, an audit function sub-item and a historical command sub-item; calling sub-detection program codes corresponding to each sub-item in the to-be-detected item, and detecting the corresponding sub-items based on the sub-detection program codes to obtain a sub-detection result corresponding to each sub-item; and based on each sub-detection result, determining a target detection result, and feeding back the target detection result to target terminal equipment. According to the technical scheme provided by the embodiment of the invention, detection of network security conditions of a host is realized in an automatic form, the labor cost is reduced, and the working efficiency is improved.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of network security, and in particular to a system detection method, device, electronic equipment, and storage medium. Background technique [0002] At present, with the popularization of host network security hardening requirements, the proportion of host network security hardening checks in daily work is increasing. The host performs periodic security checks. [0003] In the prior art, when performing network security checks on multiple hosts, it is usually necessary for the staff to carry the checklist to personally operate the corresponding equipment, and check the items related to the hosts one by one according to the content in the checklist, which is not only slow and inefficient, but also possibly Due to many human factors, there are mistakes in the inspection process. Contents of the invention [0004] The invention provides a system detection method, device, electronic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40G06F9/445
CPCH04L63/1408G06F9/44505
Inventor 刁扬李杰陈滔江文卓
Owner GUANGDONG POWER GRID CO LTD