System detection method and device, electronic equipment and storage medium
A detection method and equipment technology, applied in the field of network security, can solve the problems of slow speed, flaws in the inspection process, low efficiency, etc., to avoid flaws, reduce labor costs, and improve work efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0027] figure 1 It is a schematic flow chart of a system detection method provided by Embodiment 1 of the present invention. This embodiment is applicable to the situation where network security detection is performed on hosts in the system in an automated manner, and the method can be executed by a system detection device , the apparatus may be implemented in the form of software and / or hardware, and the hardware may be electronic equipment, such as a mobile terminal, a PC terminal, or a server.
[0028] Such as figure 1 As shown, the method specifically includes the following steps:
[0029] S110. Determine the item to be detected in response to the network security detection instruction.
[0030] Wherein, the network security detection instruction is an instruction to trigger the network security detection of the host to be detected. Specifically, in this embodiment, in order to perform network security detection on the host to be detected associated with the system, it ...
Embodiment 2
[0042] figure 2 It is a schematic flow diagram of a system detection method provided by Embodiment 2 of the present invention. On the basis of the foregoing embodiments, in response to a network security detection instruction, a network security detection item table is obtained, and based on the item table, the host computer to be detected is determined. Each sub-item in the system’s to-be-tested items; when the to-be-tested sub-items are different, it is tested in a differentiated form to obtain the corresponding sub-test results; the basic information of the host system to be tested and each sub-test The results are jointly filled into the network security detection item table, and the table is fed back to the target terminal device, realizing the technical effect of automatically feeding back the target detection results to the staff in a concise and clear form. For its specific implementation, refer to the technical solution of this embodiment. Wherein, technical terms t...
Embodiment 3
[0068] As an optional embodiment of the above embodiment, image 3 It is a schematic flowchart of a system detection method provided by Embodiment 3 of the present invention. In order to clearly introduce the technical solution of this embodiment, the application scenario can be introduced as an example where the network security detection is performed on the host in the Linux system in an automated form, but it is not limited to the above scenarios and can be applied to various In a scenario where network security detection of the system is required.
[0069] see image 3 , when performing network security testing on the host system to be tested, it is first necessary to obtain the source file of the standard form of the network security ledger based on the program in the application software, that is, the network security testing item table in Embodiment 1 and Embodiment 2. In the actual application process, this form is mainly used to check whether the network security ha...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


